Statements (70)
Predicate | Object |
---|---|
gptkbp:instanceOf |
MITRE ATT&CK tactic
|
gptkbp:describes |
Techniques that adversaries use to avoid detection throughout their compromise.
|
https://www.w3.org/2000/01/rdf-schema#label |
Defense Evasion
|
gptkbp:partOf |
gptkb:MITRE_ATT&CK_framework
|
gptkbp:technique |
gptkb:Abuse_Elevation_Control_Mechanism
gptkb:Boot_or_Logon_Autostart_Execution gptkb:Boot_or_Logon_Initialization_Scripts gptkb:Hidden_Files_and_Directories gptkb:Hijack_Execution_Flow gptkb:Impair_Defenses gptkb:Obfuscated_Files_or_Information gptkb:Process_Injection gptkb:Signed_Binary_Proxy_Execution gptkb:Subvert_Trust_Controls Impersonation Bypass User Account Control Rootkit Access Token Manipulation Clear Windows Event Logs Compromise Client Software Binary Compromise Infrastructure Deobfuscate/Decode Files or Information Disable or Modify Tools File and Directory Permissions Modification Indicator Removal on Host Indirect Command Execution Install Root Certificate Masquerading Modify Authentication Process Modify Cloud Compute Infrastructure Modify Cloud Compute Service Modify Cloud Firewall Rules Modify Cloud Identity and Access Management Modify Cloud Key Management Service Modify Cloud Logging Configuration Modify Cloud Monitoring Configuration Modify Cloud Network Configuration Modify Cloud Resource Policies Modify Cloud Security Groups Modify Cloud Service API Keys Modify Cloud Service API Permissions Modify Cloud Service Access Keys Modify Cloud Service Account Modify Cloud Service Certificates Modify Cloud Service Configuration Modify Cloud Service Credentials Modify Cloud Service Encryption Keys Modify Cloud Service Firewall Rules Modify Cloud Service Key Management Service Modify Cloud Service Logging Configuration Modify Cloud Service Monitoring Configuration Modify Cloud Service Permissions Modify Cloud Service Resource Policies Modify Cloud Service Role Modify Cloud Service Secrets Modify Cloud Service Security Groups Modify Cloud Service Security Policies Modify Cloud Service Trust Policy Modify Cloud Storage Modify Registry Modify System Image Network Boundary Bridging Parent PID Spoofing Plist Modification Service Registry Permissions Weakness Timestomp Valid Accounts Virtualization/Sandbox Evasion |
gptkbp:bfsParent |
gptkb:MITRE_ATT&CK
|
gptkbp:bfsLayer |
6
|