Gather information about targets before launching attacks.
ACCESS >>
Gain initial foothold through phishing, exploits, and supply chain.
ACCESS >>
Maintain foothold across restarts and credential changes.
ACCESS >>
Gain higher-level permissions through exploitation and abuse.
ACCESS >>
Avoid detection by disabling tools and obfuscating activity.
ACCESS >>
Steal credentials, passwords, and tokens for resource access.
ACCESS >>
Gain knowledge about internal systems and network topology.
ACCESS >>
Enter and control remote systems across the network.
ACCESS >>
Gather information from local systems and network shares.
ACCESS >>
Communicate with compromised systems via encrypted channels.
ACCESS >>
Steal data from networks over alternative protocols.
ACCESS >>
Disrupt availability through ransomware and DoS attacks.
ACCESS >>