Docs.rs
u-siem-0.0.111
u-siem 0.0.111
Docs.rs crate page
MIT
Links
Repository
crates.io
Source
Owners
SecSamDev
Dependencies
chrono ^0.4
normal
crossbeam-channel ^0.5
normal
dyn-clone ^1.0
normal
serde ^1.0
normal
serde_json ^1.0
normal
async-std ^1.10.0
dev
lazy_static ^1.4.0
dev
Versions
37.31%
of the crate is documented
Go to latest version
Platform
i686-pc-windows-msvc
i686-unknown-linux-gnu
x86_64-apple-darwin
x86_64-pc-windows-msvc
x86_64-unknown-linux-gnu
Feature flags
Rust
About docs.rs
Privacy policy
Rust website
The Book
Standard Library API Reference
Rust by Example
The Cargo Guide
Clippy Documentation
☰
Module mitre
Enums
Constants
?
Module
usiem
::
components
::
mitre
source
·
[
−
]
Enums
MitreTactics
MitreTechniques
Constants
TACTIC_COLLECTION_ENTERPRISE
TACTIC_COLLECTION_MOBILE
TACTIC_COMMAND_AND_CONTROL_ENTERPRISE
TACTIC_COMMAND_AND_CONTROL_MOBILE
TACTIC_CREDENTIAL_ACCESS_ENTERPRISE
TACTIC_CREDENTIAL_ACCESS_MOBILE
TACTIC_DEFENSE_EVASION_ENTERPRISE
TACTIC_DEFENSE_EVASION_MOBILE
TACTIC_DISCOVERY_ENTERPRISE
TACTIC_DISCOVERY_MOBILE
TACTIC_EXECUTION_ENTERPRISE
TACTIC_EXECUTION_MOBILE
TACTIC_EXFILTRATION_ENTERPRISE
TACTIC_EXFILTRATION_MOBILE
TACTIC_IMPACT_ENTERPRISE
TACTIC_IMPACT_MOBILE
TACTIC_INITIAL_ACCESS_ENTERPRISE
TACTIC_INITIAL_ACCESS_MOBILE
TACTIC_LATERAL_MOVEMENT_ENTERPRISE
TACTIC_LATERAL_MOVEMENT_MOBILE
TACTIC_NETWORK_EFFECTS_MOBILE
TACTIC_PERSISTENCE_ENTERPRISE
TACTIC_PERSISTENCE_MOBILE
TACTIC_PRIVILEGE_ESCALATION_ENTERPRISE
TACTIC_PRIVILEGE_ESCALATION_MOBILE
TACTIC_RECONNAISSANCE_ENTERPRISE
TACTIC_REMOTE_SERVICE_EFFECTS_MOBILE
TACTIC_RESOURCE_DEVELOPMENT
TECHNIQUE_ABUSE_ELEVATION_CONTROL_MECHANISM
TECHNIQUE_ACCESS_TOKEN_MANIPULATION
TECHNIQUE_ACCOUNT_ACCESS_REMOVAL
TECHNIQUE_ACCOUNT_DISCOVERY
TECHNIQUE_ACCOUNT_MANIPULATION
TECHNIQUE_ACQUIRE_INFRASTRUCTURE
TECHNIQUE_ACQUIRE_INFRASTRUCTURE_BOTNET
TECHNIQUE_ACQUIRE_INFRASTRUCTURE_DNS_SERVER
TECHNIQUE_ACQUIRE_INFRASTRUCTURE_DOMAINS
TECHNIQUE_ACQUIRE_INFRASTRUCTURE_SERVER
TECHNIQUE_ACQUIRE_INFRASTRUCTURE_VIRTUAL_PRIVATE_SERVER
TECHNIQUE_ACQUIRE_INFRASTRUCTURE_WEB_SERVICES
TECHNIQUE_ACTIVE_SCANNING
TECHNIQUE_ACTIVE_SCANNING_SCANNING_IP_BLOCKS
TECHNIQUE_ACTIVE_SCANNING_VULNERABILITY_SCANNING
TECHNIQUE_ADDITIONAL_CLOUD_CREDENTIALS
TECHNIQUE_ADD_INS
TECHNIQUE_ADD_OFFICE_365_GLOBAL_ADMINISTRATOR_ROLE
TECHNIQUE_APPLESCRIPT
TECHNIQUE_APPLICATION_ACCESS_TOKEN
TECHNIQUE_APPLICATION_EXHAUSTION_FLOOD
TECHNIQUE_APPLICATION_LAYER_PROTOCOL
TECHNIQUE_APPLICATION_OR_SYSTEM_EXPLOITATION
TECHNIQUE_APPLICATION_WINDOW_DISCOVERY
TECHNIQUE_ARCHIVE_COLLECTED_DATA
TECHNIQUE_ARCHIVE_VIA_CUSTOM_METHOD
TECHNIQUE_ARCHIVE_VIA_LIBRARY
TECHNIQUE_ARCHIVE_VIA_UTILITY
TECHNIQUE_ARP_CACHE_POISONING
TECHNIQUE_ASYMMETRIC_CRYPTOGRAPHY
TECHNIQUE_AUDIO_CAPTURE
TECHNIQUE_AUTOMATED_COLLECTION
TECHNIQUE_AUTOMATED_EXFILTRATION
TECHNIQUE_BASH_HISTORY
TECHNIQUE_BIDIRECTIONAL_COMMUNICATION
TECHNIQUE_BITS_JOBS
TECHNIQUE_BOOTKIT
TECHNIQUE_BOOT_OR_LOGON_AUTOSTART_EXECUTION
TECHNIQUE_BOOT_OR_LOGON_AUTOSTART_EXECUTION_ACTIVE_SETUP
TECHNIQUE_BOOT_OR_LOGON_AUTOSTART_EXECUTION_AUTHENTICATION_PACKAGE
TECHNIQUE_BOOT_OR_LOGON_AUTOSTART_EXECUTION_KERNEL_MODULES_AND_EXTENSIONS
TECHNIQUE_BOOT_OR_LOGON_AUTOSTART_EXECUTION_LSASS_DRIVER
TECHNIQUE_BOOT_OR_LOGON_AUTOSTART_EXECUTION_PLIST_MODIFICATION
TECHNIQUE_BOOT_OR_LOGON_AUTOSTART_EXECUTION_PORT_MONITORS
TECHNIQUE_BOOT_OR_LOGON_AUTOSTART_EXECUTION_PRINT_PROCESSORS
TECHNIQUE_BOOT_OR_LOGON_AUTOSTART_EXECUTION_REGISTRY_RUN_KEYS_STARTUP_FOLDER
TECHNIQUE_BOOT_OR_LOGON_AUTOSTART_EXECUTION_RE_OPENED_APPLICATIONS
TECHNIQUE_BOOT_OR_LOGON_AUTOSTART_EXECUTION_SECURITY_SUPPORT_PROVIDER
TECHNIQUE_BOOT_OR_LOGON_AUTOSTART_EXECUTION_SHORTCUT_MODIFICATION
TECHNIQUE_BOOT_OR_LOGON_AUTOSTART_EXECUTION_TIME_PROVIDERS
TECHNIQUE_BOOT_OR_LOGON_AUTOSTART_EXECUTION_WINLOGON_HELPER_DLL
TECHNIQUE_BOOT_OR_LOGON_AUTOSTART_EXECUTION_XDG_AUTOSTART_ENTRIES
TECHNIQUE_BOOT_OR_LOGON_INITIALIZATION_SCRIPTS
TECHNIQUE_BROWSER_BOOKMARK_DISCOVERY
TECHNIQUE_BROWSER_EXTENSIONS
TECHNIQUE_BRUTE_FORCE
TECHNIQUE_BUILD_IMAGE_ON_HOST
TECHNIQUE_BYPASS_USER_ACCOUNT_CONTROL
TECHNIQUE_CLEAR_COMMAND_HISTORY
TECHNIQUE_CLEAR_LINUX_OR_MAC_SYSTEM_LOGS
TECHNIQUE_CLEAR_WINDOWS_EVENT_LOGS
TECHNIQUE_CLIPBOARD_DATA
TECHNIQUE_CLOUD_ACCOUNT
TECHNIQUE_CLOUD_ACCOUNTS
TECHNIQUE_CLOUD_GROUPS
TECHNIQUE_CLOUD_INFRASTRUCTURE_DISCOVERY
TECHNIQUE_CLOUD_INSTANCE_METADATA_API
TECHNIQUE_CLOUD_SERVICE_DASHBOARD
TECHNIQUE_CLOUD_SERVICE_DISCOVERY
TECHNIQUE_CODE_SIGNING
TECHNIQUE_CODE_SIGNING_POLICY_MODIFICATION
TECHNIQUE_COMMAND_AND_SCRIPTING_INTERPRETER
TECHNIQUE_COMMUNICATION_THROUGH_REMOVABLE_MEDIA
TECHNIQUE_COMPONENT_FIRMWARE
TECHNIQUE_COMPONENT_OBJECT_MODEL
TECHNIQUE_COMPROMISE_ACCOUNTS
TECHNIQUE_COMPROMISE_ACCOUNTS_EMAIL_ACCOUNTS
TECHNIQUE_COMPROMISE_ACCOUNTS_SOCIAL_MEDIA_ACCOUNTS
TECHNIQUE_COMPROMISE_CLIENT_SOFTWARE_BINARY
TECHNIQUE_COMPROMISE_HARDWARE_SUPPLY_CHAIN
TECHNIQUE_COMPROMISE_INFRASTRUCTURE
TECHNIQUE_COMPROMISE_INFRASTRUCTURE_BOTNET
TECHNIQUE_COMPROMISE_INFRASTRUCTURE_DNS_SERVER
TECHNIQUE_COMPROMISE_INFRASTRUCTURE_DOMAINS
TECHNIQUE_COMPROMISE_INFRASTRUCTURE_SERVER
TECHNIQUE_COMPROMISE_INFRASTRUCTURE_VIRTUAL_PRIVATE_SERVER
TECHNIQUE_COMPROMISE_INFRASTRUCTURE_WEB_SERVICES
TECHNIQUE_COMPROMISE_SOFTWARE_DEPENDENCIES_AND_DEVELOPMENT_TOOLS
TECHNIQUE_COMPROMISE_SOFTWARE_SUPPLY_CHAIN
TECHNIQUE_CONFLUENCE
TECHNIQUE_CONTAINER_ADMINISTRATION_COMMAND
TECHNIQUE_CONTAINER_AND_RESOURCE_DISCOVERY
TECHNIQUE_CONTAINER_API
TECHNIQUE_COR_PROFILER
TECHNIQUE_CREATE_ACCOUNT
TECHNIQUE_CREATE_ACCOUNT_CLOUD_ACCOUNT
TECHNIQUE_CREATE_ACCOUNT_DOMAIN_ACCOUNT
TECHNIQUE_CREATE_ACCOUNT_LOCAL_ACCOUNT
TECHNIQUE_CREATE_CLOUD_INSTANCE
TECHNIQUE_CREATE_OR_MODIFY_SYSTEM_PROCESS
TECHNIQUE_CREATE_PROCESS_WITH_TOKEN
TECHNIQUE_CREATE_SNAPSHOT
TECHNIQUE_CREDENTIALS_FROM_PASSWORD_STORES
TECHNIQUE_CREDENTIALS_FROM_WEB_BROWSERS
TECHNIQUE_CREDENTIALS_IN_FILES
TECHNIQUE_CREDENTIALS_IN_REGISTRY
TECHNIQUE_CREDENTIAL_API_HOOKING
TECHNIQUE_CREDENTIAL_STUFFING
TECHNIQUE_DATA_DESTRUCTION
TECHNIQUE_DATA_ENCODING
TECHNIQUE_DATA_ENCRYPTED_FOR_IMPACT
TECHNIQUE_DATA_FROM_CLOUD_STORAGE_OBJECT
TECHNIQUE_DATA_FROM_CONFIGURATION_REPOSITORY
TECHNIQUE_DATA_FROM_INFORMATION_REPOSITORIES
TECHNIQUE_DATA_FROM_LOCAL_SYSTEM
TECHNIQUE_DATA_FROM_NETWORK_SHARED_DRIVE
TECHNIQUE_DATA_FROM_REMOVABLE_MEDIA
TECHNIQUE_DATA_MANIPULATION
TECHNIQUE_DATA_OBFUSCATION
TECHNIQUE_DATA_OBFUSCATION_JUNK_DATA
TECHNIQUE_DATA_OBFUSCATION_PROTOCOL_IMPERSONATION
TECHNIQUE_DATA_OBFUSCATION_STEGANOGRAPHY
TECHNIQUE_DATA_STAGED
TECHNIQUE_DATA_TRANSFER_SIZE_LIMITS
TECHNIQUE_DEAD_DROP_RESOLVER
TECHNIQUE_DEFACEMENT
TECHNIQUE_DEFAULT_ACCOUNTS
TECHNIQUE_DELETE_CLOUD_INSTANCE
TECHNIQUE_DEOBFUSCATE_DECODE_FILES_OR_INFORMATION
TECHNIQUE_DEPLOY_CONTAINER
TECHNIQUE_DEVELOP_CAPABILITIES
TECHNIQUE_DEVELOP_CAPABILITIES_CODE_SIGNING_CERTIFICATES
TECHNIQUE_DEVELOP_CAPABILITIES_DIGITAL_CERTIFICATES
TECHNIQUE_DEVELOP_CAPABILITIES_EXPLOITS
TECHNIQUE_DEVELOP_CAPABILITIES_MALWARE
TECHNIQUE_DIRECT_NETWORK_FLOOD
TECHNIQUE_DIRECT_VOLUME_ACCESS
TECHNIQUE_DISK_CONTENT_WIPE
TECHNIQUE_DISK_STRUCTURE_WIPE
TECHNIQUE_DISK_WIPE
TECHNIQUE_DISTRIBUTED_COMPONENT_OBJECT_MODEL
TECHNIQUE_DLL_SEARCH_ORDER_HIJACKING
TECHNIQUE_DLL_SIDE_LOADING
TECHNIQUE_DNS
TECHNIQUE_DNS_CALCULATION
TECHNIQUE_DOMAIN_ACCOUNT
TECHNIQUE_DOMAIN_ACCOUNTS
TECHNIQUE_DOMAIN_CONTROLLER_AUTHENTICATION
TECHNIQUE_DOMAIN_FRONTING
TECHNIQUE_DOMAIN_GENERATION_ALGORITHMS
TECHNIQUE_DOMAIN_GROUPS
TECHNIQUE_DOMAIN_POLICY_MODIFICATION
TECHNIQUE_DOMAIN_TRUST_DISCOVERY
TECHNIQUE_DOMAIN_TRUST_MODIFICATION
TECHNIQUE_DOWNGRADE_SYSTEM_IMAGE
TECHNIQUE_DRIVE_BY_COMPROMISE
TECHNIQUE_DYLIB_HIJACKING
TECHNIQUE_DYNAMIC_DATA_EXCHANGE
TECHNIQUE_DYNAMIC_LINKER_HIJACKING
TECHNIQUE_DYNAMIC_RESOLUTION
TECHNIQUE_ELEVATED_EXECUTION_WITH_PROMPT
TECHNIQUE_EMAIL_ACCOUNT
TECHNIQUE_EMAIL_COLLECTION
TECHNIQUE_EMAIL_FORWARDING_RULE
TECHNIQUE_ENCRYPTED_CHANNEL
TECHNIQUE_ENDPOINT_DENIAL_OF_SERVICE
TECHNIQUE_ENVIRONMENTAL_KEYING
TECHNIQUE_ESCAPE_TO_HOST
TECHNIQUE_ESTABLISH_ACCOUNTS
TECHNIQUE_ESTABLISH_ACCOUNTS_EMAIL_ACCOUNTS
TECHNIQUE_ESTABLISH_ACCOUNTS_SOCIAL_MEDIA_ACCOUNTS
TECHNIQUE_EVENT_TRIGGERED_EXECUTION
TECHNIQUE_EVENT_TRIGGERED_EXECUTION_ACCESSIBILITY_FEATURES
TECHNIQUE_EVENT_TRIGGERED_EXECUTION_APPCERT_DLLS
TECHNIQUE_EVENT_TRIGGERED_EXECUTION_APPINIT_DLLS
TECHNIQUE_EVENT_TRIGGERED_EXECUTION_APPLICATION_SHIMMING
TECHNIQUE_EVENT_TRIGGERED_EXECUTION_CHANGE_DEFAULT_FILE_ASSOCIATION
TECHNIQUE_EVENT_TRIGGERED_EXECUTION_COMPONENT_OBJECT_MODEL_HIJACKING
TECHNIQUE_EVENT_TRIGGERED_EXECUTION_EMOND
TECHNIQUE_EVENT_TRIGGERED_EXECUTION_IMAGE_FILE_EXECUTION_OPTIONS_INJECTION
TECHNIQUE_EVENT_TRIGGERED_EXECUTION_LC_LOAD_DYLIB_ADDITION
TECHNIQUE_EVENT_TRIGGERED_EXECUTION_NETSH_HELPER_DLL
TECHNIQUE_EVENT_TRIGGERED_EXECUTION_POWERSHELL_PROFILE
TECHNIQUE_EVENT_TRIGGERED_EXECUTION_SCREENSAVER
TECHNIQUE_EVENT_TRIGGERED_EXECUTION_TRAP
TECHNIQUE_EVENT_TRIGGERED_EXECUTION_UNIX_SHELL_CONFIGURATION_MODIFICATION
TECHNIQUE_EVENT_TRIGGERED_EXECUTION_WINDOWS_MANAGEMENT_INSTRUMENTATION_EVENT_SUBSCRIPTION
TECHNIQUE_EXCHANGE_EMAIL_DELEGATE_PERMISSIONS
TECHNIQUE_EXECUTABLE_INSTALLER_FILE_PERMISSIONS_WEAKNESS
TECHNIQUE_EXECUTION_GUARDRAILS
TECHNIQUE_EXFILTRATION_OVER_ALTERNATIVE_PROTOCOL
TECHNIQUE_EXFILTRATION_OVER_ASYMMETRIC_ENCRYPTED_NON_C2_PROTOCOL
TECHNIQUE_EXFILTRATION_OVER_BLUETOOTH
TECHNIQUE_EXFILTRATION_OVER_C2_CHANNEL
TECHNIQUE_EXFILTRATION_OVER_OTHER_NETWORK_MEDIUM
TECHNIQUE_EXFILTRATION_OVER_PHYSICAL_MEDIUM
TECHNIQUE_EXFILTRATION_OVER_SYMMETRIC_ENCRYPTED_NON_C2_PROTOCOL
TECHNIQUE_EXFILTRATION_OVER_UNENCRYPTED_OBFUSCATED_NON_C2_PROTOCOL
TECHNIQUE_EXFILTRATION_OVER_USB
TECHNIQUE_EXFILTRATION_OVER_WEB_SERVICE
TECHNIQUE_EXFILTRATION_TO_CLOUD_STORAGE
TECHNIQUE_EXFILTRATION_TO_CODE_REPOSITORY
TECHNIQUE_EXPLOITATION_FOR_CLIENT_EXECUTION
TECHNIQUE_EXPLOITATION_FOR_CREDENTIAL_ACCESS
TECHNIQUE_EXPLOITATION_FOR_DEFENSE_EVASION
TECHNIQUE_EXPLOITATION_FOR_PRIVILEGE_ESCALATION
TECHNIQUE_EXPLOITATION_OF_REMOTE_SERVICES
TECHNIQUE_EXPLOIT_PUBLIC_FACING_APPLICATION
TECHNIQUE_EXTERNAL_DEFACEMENT
TECHNIQUE_EXTERNAL_PROXY
TECHNIQUE_EXTERNAL_REMOTE_SERVICES
TECHNIQUE_FALLBACK_CHANNELS
TECHNIQUE_FAST_FLUX_DNS
TECHNIQUE_FILE_AND_DIRECTORY_DISCOVERY
TECHNIQUE_FILE_AND_DIRECTORY_PERMISSIONS_MODIFICATION
TECHNIQUE_FILE_DELETION
TECHNIQUE_FILE_TRANSFER_PROTOCOLS
TECHNIQUE_FIRMWARE_CORRUPTION
TECHNIQUE_FORCED_AUTHENTICATION
TECHNIQUE_FORGE_WEB_CREDENTIALS
TECHNIQUE_GATEKEEPER_BYPASS
TECHNIQUE_GATHER_VICTIM_HOST_INFORMATION
TECHNIQUE_GATHER_VICTIM_HOST_INFORMATION_CLIENT_CONFIGURATIONS
TECHNIQUE_GATHER_VICTIM_HOST_INFORMATION_FIRMWARE
TECHNIQUE_GATHER_VICTIM_HOST_INFORMATION_HARDWARE
TECHNIQUE_GATHER_VICTIM_HOST_INFORMATION_SOFTWARE
TECHNIQUE_GATHER_VICTIM_IDENTITY_INFORMATION
TECHNIQUE_GATHER_VICTIM_IDENTITY_INFORMATION_CREDENTIALS
TECHNIQUE_GATHER_VICTIM_IDENTITY_INFORMATION_EMAIL_ADDRESSES
TECHNIQUE_GATHER_VICTIM_IDENTITY_INFORMATION_EMPLOYEE_NAMES
TECHNIQUE_GATHER_VICTIM_NETWORK_INFORMATION
TECHNIQUE_GATHER_VICTIM_NETWORK_INFORMATION_DNS
TECHNIQUE_GATHER_VICTIM_NETWORK_INFORMATION_DOMAIN_PROPERTIES
TECHNIQUE_GATHER_VICTIM_NETWORK_INFORMATION_IP_ADDRESSES
TECHNIQUE_GATHER_VICTIM_NETWORK_INFORMATION_NETWORK_SECURITY_APPLIANCES
TECHNIQUE_GATHER_VICTIM_NETWORK_INFORMATION_NETWORK_TOPOLOGY
TECHNIQUE_GATHER_VICTIM_NETWORK_INFORMATION_NETWORK_TRUST_DEPENDENCIES
TECHNIQUE_GATHER_VICTIM_ORG_INFORMATION
TECHNIQUE_GATHER_VICTIM_ORG_INFORMATION_BUSINESS_RELATIONSHIPS
TECHNIQUE_GATHER_VICTIM_ORG_INFORMATION_DETERMINE_PHYSICAL_LOCATIONS
TECHNIQUE_GATHER_VICTIM_ORG_INFORMATION_IDENTIFY_BUSINESS_TEMPO
TECHNIQUE_GATHER_VICTIM_ORG_INFORMATION_IDENTIFY_ROLES
TECHNIQUE_GROUP_POLICY_MODIFICATION
TECHNIQUE_GROUP_POLICY_PREFERENCES
TECHNIQUE_GUI_INPUT_CAPTURE
TECHNIQUE_HARDWARE_ADDITIONS
TECHNIQUE_HIDDEN_FILES_AND_DIRECTORIES
TECHNIQUE_HIDDEN_FILES_AND_DIRECTORIES_HIDDEN_FILE_SYSTEM
TECHNIQUE_HIDDEN_FILES_AND_DIRECTORIES_HIDDEN_USERS
TECHNIQUE_HIDDEN_FILES_AND_DIRECTORIES_HIDDEN_WINDOW
TECHNIQUE_HIDDEN_FILES_AND_DIRECTORIES_NTFS_FILE_ATRIBUTES
TECHNIQUE_HIDDEN_FILES_AND_DIRECTORIES_RUN_VIRTUAL_INSTANCE
TECHNIQUE_HIDDEN_FILES_AND_DIRECTORIES_VBA_STOMPING
TECHNIQUE_HIDE_ARTIFACTS
TECHNIQUE_HIJACK_EXECUTION_FLOW
TECHNIQUE_IMPAIR_DEFENSES
TECHNIQUE_IMPAIR_DEFENSES_DISABLE_CLOUD_LOGS
TECHNIQUE_IMPAIR_DEFENSES_DISABLE_OR_MODIFY_CLOUD_FIREWALL
TECHNIQUE_IMPAIR_DEFENSES_DISABLE_OR_MODIFY_SYSTEM_FIREWALL
TECHNIQUE_IMPAIR_DEFENSES_DISABLE_OR_MODIFY_TOOLS
TECHNIQUE_IMPAIR_DEFENSES_DISABLE_WINDOWS_EVENT_LOGGING
TECHNIQUE_IMPAIR_DEFENSES_IMPAIR_COMMAND_HISTORY_LOGGING
TECHNIQUE_IMPAIR_DEFENSES_INDICATOR_BLOCKING
TECHNIQUE_IMPLANT_INTERNAL_IMAGE
TECHNIQUE_INDICATOR_REMOVAL_ON_HOST
TECHNIQUE_INDIRECT_COMMAND_EXECUTION
TECHNIQUE_INGRESS_TOOL_TRANSFER
TECHNIQUE_INHIBIT_SYSTEM_RECOVERY
TECHNIQUE_INPUT_CAPTURE
TECHNIQUE_INSTALL_ROOT_CERTIFICATE
TECHNIQUE_INTERNAL_DEFACEMENT
TECHNIQUE_INTERNAL_PROXY
TECHNIQUE_INTERNAL_SPEARPHISHING
TECHNIQUE_INTERNET_CONNECTION_DISCOVERY
TECHNIQUE_INTER_PROCESS_COMMUNICATION
TECHNIQUE_JAVASCRIPT
TECHNIQUE_KEYCHAIN
TECHNIQUE_KEYLOGGING
TECHNIQUE_LATERAL_TOOL_TRANSFER
TECHNIQUE_LAUNCHCTL
TECHNIQUE_LAUNCH_AGENT
TECHNIQUE_LAUNCH_DAEMON
TECHNIQUE_LINUX_AND_MAC_FILE_AND_DIRECTORY_PERMISSIONS_MODIFICATION
TECHNIQUE_LLMNR_NBT_NS_POISONING_AND_SMB_RELAY
TECHNIQUE_LOCAL_ACCOUNT
TECHNIQUE_LOCAL_ACCOUNTS
TECHNIQUE_LOCAL_DATA_STAGING
TECHNIQUE_LOCAL_EMAIL_COLLECTION
TECHNIQUE_LOCAL_GROUPS
TECHNIQUE_LOGON_SCRIPT_MAC
TECHNIQUE_LOGON_SCRIPT_WINDOWS
TECHNIQUE_MAIL_PROTOCOLS
TECHNIQUE_MAKE_AND_IMPERSONATE_TOKEN
TECHNIQUE_MALICIOUS_FILE
TECHNIQUE_MALICIOUS_IMAGE
TECHNIQUE_MALICIOUS_LINK
TECHNIQUE_MAN_IN_THE_BROWSER
TECHNIQUE_MAN_IN_THE_MIDDLE
TECHNIQUE_MARK_OF_THE_WEB_BYPASS
TECHNIQUE_MASQUERADING
TECHNIQUE_MASQUERADING_INVALID_CODE_SIGNATURE
TECHNIQUE_MASQUERADING_MASQUERADE_TASK_OR_SERVICE
TECHNIQUE_MASQUERADING_MATCH_LEGITIMATE_NAME_OR_LOCATION
TECHNIQUE_MASQUERADING_RENAME_SYSTEM_UTILITIES
TECHNIQUE_MASQUERADING_RIGHT_TO_LEFT_OVERRIDE
TECHNIQUE_MASQUERADING_SPACE_AFTER_FILENAME
TECHNIQUE_MODIFY_AUTHENTICATION_PROCESS
TECHNIQUE_MODIFY_CLOUD_COMPUTE_INFRASTRUCTURE
TECHNIQUE_MODIFY_REGISTRY
TECHNIQUE_MODIFY_SYSTEM_IMAGE
TECHNIQUE_MSBUILD
TECHNIQUE_MULTI_HOP_PROXY
TECHNIQUE_MULTI_STAGE_CHANNELS
TECHNIQUE_NATIVE_API
TECHNIQUE_NETWORK_BOUNDARY_BRIDGING
TECHNIQUE_NETWORK_BOUNDARY_BRIDGING_NETWORK_ADDRESS_TRANSLATION_TRAVERSAL
TECHNIQUE_NETWORK_DENIAL_OF_SERVICE
TECHNIQUE_NETWORK_DEVICE_AUTHENTICATION
TECHNIQUE_NETWORK_DEVICE_CLI
TECHNIQUE_NETWORK_DEVICE_CONFIGURATION_DUMP
TECHNIQUE_NETWORK_LOGON_SCRIPT
TECHNIQUE_NETWORK_SERVICE_SCANNING
TECHNIQUE_NETWORK_SHARE_CONNECTION_REMOVAL
TECHNIQUE_NETWORK_SHARE_DISCOVERY
TECHNIQUE_NETWORK_SNIFFING
TECHNIQUE_NON_APPLICATION_LAYER_PROTOCOL
TECHNIQUE_NON_STANDARD_ENCODING
TECHNIQUE_NON_STANDARD_PORT
TECHNIQUE_OBFUSCATED_FILES_OR_INFORMATION
TECHNIQUE_OBFUSCATED_FILES_OR_INFORMATION_BINARY_PADDING
TECHNIQUE_OBFUSCATED_FILES_OR_INFORMATION_COMPILE_AFTER_DELIVERY
TECHNIQUE_OBFUSCATED_FILES_OR_INFORMATION_INDICATOR_REMOVAL_FROM_TOOLS
TECHNIQUE_OBFUSCATED_FILES_OR_INFORMATION_SOFTWARE_PACKING
TECHNIQUE_OBFUSCATED_FILES_OR_INFORMATION_STEGANOGRAPHY
TECHNIQUE_OBTAIN_CAPABILITIES
TECHNIQUE_OBTAIN_CAPABILITIES_CODE_SIGNING_CERTIFICATES
TECHNIQUE_OBTAIN_CAPABILITIES_DIGITAL_CERTIFICATES
TECHNIQUE_OBTAIN_CAPABILITIES_EXPLOITS
TECHNIQUE_OBTAIN_CAPABILITIES_MALWARE
TECHNIQUE_OBTAIN_CAPABILITIES_TOOL
TECHNIQUE_OBTAIN_CAPABILITIES_VULNERABILITIES
TECHNIQUE_OFFICE_APPLICATION_STARTUP
TECHNIQUE_OFFICE_TEMPLATE_MACROS
TECHNIQUE_OFFICE_TEST
TECHNIQUE_ONE_WAY_COMMUNICATION
TECHNIQUE_OS_CREDENTIAL_DUMPING
TECHNIQUE_OS_CREDENTIAL_DUMPING_CACHED_DOMAIN_CREDENTIALS
TECHNIQUE_OS_CREDENTIAL_DUMPING_DCSYNC
TECHNIQUE_OS_CREDENTIAL_DUMPING_LSASS_MEMORY
TECHNIQUE_OS_CREDENTIAL_DUMPING_LSA_SECRETS
TECHNIQUE_OS_CREDENTIAL_DUMPING_NTDS
TECHNIQUE_OS_CREDENTIAL_DUMPING_PASSWD_AND_SHADOW
TECHNIQUE_OS_CREDENTIAL_DUMPING_PROC_FILESYSTEM
TECHNIQUE_OS_CREDENTIAL_DUMPING_SECURITY_ACCOUNT_MANAGER
TECHNIQUE_OS_EXHAUSTION_FLOOD
TECHNIQUE_OUTLOOK_FORMS
TECHNIQUE_OUTLOOK_HOME_PAGE
TECHNIQUE_OUTLOOK_RULES
TECHNIQUE_PARENT_PID_SPOOFING
TECHNIQUE_PASSWORD_CRACKING
TECHNIQUE_PASSWORD_FILTER_DLL
TECHNIQUE_PASSWORD_GUESSING
TECHNIQUE_PASSWORD_MANAGERS
TECHNIQUE_PASSWORD_POLICY_DISCOVERY
TECHNIQUE_PASSWORD_SPRAYING
TECHNIQUE_PASS_THE_HASH
TECHNIQUE_PASS_THE_TICKET
TECHNIQUE_PATCH_SYSTEM_IMAGE
TECHNIQUE_PATH_INTERCEPTION_BY_PATH_ENVIRONMENT_VARIABLE
TECHNIQUE_PATH_INTERCEPTION_BY_SEARCH_ORDER_HIJACKING
TECHNIQUE_PATH_INTERCEPTION_BY_UNQUOTED_PATH
TECHNIQUE_PERIPHERAL_DEVICE_DISCOVERY
TECHNIQUE_PERMISSION_GROUPS_DISCOVERY
TECHNIQUE_PHISHING
TECHNIQUE_PHISHING_FOR_INFORMATION
TECHNIQUE_PHISHING_FOR_INFORMATION_SPEARPHISHING_ATACHMENT
TECHNIQUE_PHISHING_FOR_INFORMATION_SPEARPHISHING_LINK
TECHNIQUE_PHISHING_FOR_INFORMATION_SPEARPHISHING_SERVICE
TECHNIQUE_PLUGGABLE_AUTHENTICATION_MODULES
TECHNIQUE_PORT_KNOCKING
TECHNIQUE_POWERSHELL
TECHNIQUE_PRE_OS_BOOT
TECHNIQUE_PRIVATE_KEYS
TECHNIQUE_PROCESS_DISCOVERY
TECHNIQUE_PROCESS_INJECTION
TECHNIQUE_PROCESS_INJECTION_ASYNCHRONOUS_PROCEDURE_CALL
TECHNIQUE_PROCESS_INJECTION_DYNAMIC_LINK_LIBRARY_INJECTION
TECHNIQUE_PROCESS_INJECTION_EXTRA_WINDOW_MEMORY_INJECTION
TECHNIQUE_PROCESS_INJECTION_PORTABLE_EXECUTABLE_INJECTION
TECHNIQUE_PROCESS_INJECTION_PROCESS_DOPPELGÄNGING
TECHNIQUE_PROCESS_INJECTION_PROCESS_HOLLOWING
TECHNIQUE_PROCESS_INJECTION_PROC_MEMORY
TECHNIQUE_PROCESS_INJECTION_PTRACE_SYSTEM_CALLS
TECHNIQUE_PROCESS_INJECTION_THREAD_EXECUTION_HIJACKING
TECHNIQUE_PROCESS_INJECTION_THREAD_LOCAL_STORAGE
TECHNIQUE_PROCESS_INJECTION_VDSO_HIJACKING
TECHNIQUE_PROTOCOL_TUNNELING
TECHNIQUE_PROXY
TECHNIQUE_PUBPRN
TECHNIQUE_PYTHON
TECHNIQUE_QUERY_REGISTRY
TECHNIQUE_RC_SCRIPTS
TECHNIQUE_RDP_HIJACKING
TECHNIQUE_REFLECTION_AMPLIFICATION
TECHNIQUE_REMOTE_ACCESS_SOFTWARE
TECHNIQUE_REMOTE_DATA_STAGING
TECHNIQUE_REMOTE_DESKTOP_PROTOCOL
TECHNIQUE_REMOTE_EMAIL_COLLECTION
TECHNIQUE_REMOTE_SERVICES
TECHNIQUE_REMOTE_SERVICE_SESSION_HIJACKING
TECHNIQUE_REMOTE_SYSTEM_DISCOVERY
TECHNIQUE_REPLICATION_THROUGH_REMOVABLE_MEDIA
TECHNIQUE_RESOURCE_HIJACKING
TECHNIQUE_REVERT_CLOUD_INSTANCE
TECHNIQUE_ROGUE_DOMAIN_CONTROLLER
TECHNIQUE_ROMMONKIT
TECHNIQUE_ROOTKIT
TECHNIQUE_RUNTIME_DATA_MANIPULATION
TECHNIQUE_SAML_TOKENS
TECHNIQUE_SCHEDULED_TASK_JOB
TECHNIQUE_SCHEDULED_TASK_JOB_AT_LINUX
TECHNIQUE_SCHEDULED_TASK_JOB_AT_WINDOWS
TECHNIQUE_SCHEDULED_TASK_JOB_CONTAINER_ORCHESTRATION_JOB
TECHNIQUE_SCHEDULED_TASK_JOB_CRON
TECHNIQUE_SCHEDULED_TASK_JOB_LAUNCHD
TECHNIQUE_SCHEDULED_TASK_JOB_SCHEDULED_TASK
TECHNIQUE_SCHEDULED_TASK_JOB_SYSTEMD_TIMERS
TECHNIQUE_SCHEDULED_TRANSFER
TECHNIQUE_SCREEN_CAPTURE
TECHNIQUE_SEARCH_CLOSED_SOURCES
TECHNIQUE_SEARCH_CLOSED_SOURCES_PURCHASE_TECHNICAL_DATA
TECHNIQUE_SEARCH_CLOSED_SOURCES_THREAT_INTEL_VENDORS
TECHNIQUE_SEARCH_OPEN_TECHNICAL_DATABASES
TECHNIQUE_SEARCH_OPEN_TECHNICAL_DATABASES_CDNS
TECHNIQUE_SEARCH_OPEN_TECHNICAL_DATABASES_DIGITAL_CERTIFICATES
TECHNIQUE_SEARCH_OPEN_TECHNICAL_DATABASES_DNS_PASSIVE_DNS
TECHNIQUE_SEARCH_OPEN_TECHNICAL_DATABASES_SCAN_DATABASES
TECHNIQUE_SEARCH_OPEN_TECHNICAL_DATABASES_WHOIS
TECHNIQUE_SEARCH_OPEN_WEBSITES_DOMAINS
TECHNIQUE_SEARCH_OPEN_WEBSITES_DOMAINS_SEARCH_ENGINES
TECHNIQUE_SEARCH_OPEN_WEBSITES_DOMAINS_SOCIAL_MEDIA
TECHNIQUE_SEARCH_VICTIM_OWNED_WEBSITES
TECHNIQUE_SECURITYD_MEMORY
TECHNIQUE_SECURITY_SOFTWARE_DISCOVERY
TECHNIQUE_SERVER_SOFTWARE_COMPONENT
TECHNIQUE_SERVICES_FILE_PERMISSIONS_WEAKNESS
TECHNIQUE_SERVICES_REGISTRY_PERMISSIONS_WEAKNESS
TECHNIQUE_SERVICE_EXECUTION
TECHNIQUE_SERVICE_EXHAUSTION_FLOOD
TECHNIQUE_SERVICE_STOP
TECHNIQUE_SETUID_AND_SETGID
TECHNIQUE_SHARED_MODULES
TECHNIQUE_SHAREPOINT
TECHNIQUE_SID_HISTORY_INJECTION
TECHNIQUE_SIGNED_BINARY_PROXY_EXECUTION
TECHNIQUE_SIGNED_BINARY_PROXY_EXECUTION_CMSTP
TECHNIQUE_SIGNED_BINARY_PROXY_EXECUTION_COMPILED_HTML_FILE
TECHNIQUE_SIGNED_BINARY_PROXY_EXECUTION_CONTROL_PANEL
TECHNIQUE_SIGNED_BINARY_PROXY_EXECUTION_INSTALLUTIL
TECHNIQUE_SIGNED_BINARY_PROXY_EXECUTION_MSHTA
TECHNIQUE_SIGNED_BINARY_PROXY_EXECUTION_MSIEXEC
TECHNIQUE_SIGNED_BINARY_PROXY_EXECUTION_ODBCCONF
TECHNIQUE_SIGNED_BINARY_PROXY_EXECUTION_REGSVCS_REGASM
TECHNIQUE_SIGNED_BINARY_PROXY_EXECUTION_REGSVR32
TECHNIQUE_SIGNED_BINARY_PROXY_EXECUTION_RUNDLL32
TECHNIQUE_SIGNED_BINARY_PROXY_EXECUTION_VERCLSID
TECHNIQUE_SIGNED_SCRIPT_PROXY_EXECUTION
TECHNIQUE_SIP_AND_TRUST_PROVIDER_HIJACKING
TECHNIQUE_SMB_WINDOWS_ADMIN_SHARES
TECHNIQUE_SNMP_MIB_DUMP
TECHNIQUE_SOFTWARE_DEPLOYMENT_TOOLS
TECHNIQUE_SOFTWARE_DISCOVERY
TECHNIQUE_SPEARPHISHING_ATACHMENT
TECHNIQUE_SPEARPHISHING_LINK
TECHNIQUE_SPEARPHISHING_VIA_SERVICE
TECHNIQUE_SQL_STORED_PROCEDURES
TECHNIQUE_SSH
TECHNIQUE_SSH_AUTHORIZED_KEYS
TECHNIQUE_SSH_HIJACKING
TECHNIQUE_STAGE_CAPABILITIES
TECHNIQUE_STAGE_CAPABILITIES_DRIVE_BY_TARGET
TECHNIQUE_STAGE_CAPABILITIES_INSTALL_DIGITAL_CERTIFICATE
TECHNIQUE_STAGE_CAPABILITIES_LINK_TARGET
TECHNIQUE_STAGE_CAPABILITIES_UPLOAD_MALWARE
TECHNIQUE_STAGE_CAPABILITIES_UPLOAD_TOOL
TECHNIQUE_STANDARD_ENCODING
TECHNIQUE_STARTUP_ITEMS
TECHNIQUE_STEAL_APPLICATION_ACCESS_TOKEN
TECHNIQUE_STEAL_OR_FORGE_KERBEROS_TICKETS
TECHNIQUE_STEAL_OR_FORGE_KERBEROS_TICKETS_AS_REP_ROASTING
TECHNIQUE_STEAL_OR_FORGE_KERBEROS_TICKETS_GOLDEN_TICKET
TECHNIQUE_STEAL_OR_FORGE_KERBEROS_TICKETS_KERBEROASTING
TECHNIQUE_STEAL_OR_FORGE_KERBEROS_TICKETS_SILVER_TICKET
TECHNIQUE_STEAL_WEB_SESSION_COOKIE
TECHNIQUE_STORED_DATA_MANIPULATION
TECHNIQUE_SUBVERT_TRUST_CONTROLS
TECHNIQUE_SUDO_AND_SUDO_CACHING
TECHNIQUE_SUPPLY_CHAIN_COMPROMISE
TECHNIQUE_SYMMETRIC_CRYPTOGRAPHY
TECHNIQUE_SYSTEMD_SERVICE
TECHNIQUE_SYSTEM_CHECKS
TECHNIQUE_SYSTEM_FIRMWARE
TECHNIQUE_SYSTEM_INFORMATION_DISCOVERY
TECHNIQUE_SYSTEM_LOCATION_DISCOVERY
TECHNIQUE_SYSTEM_NETWORK_CONFIGURATION_DISCOVERY
TECHNIQUE_SYSTEM_NETWORK_CONNECTIONS_DISCOVERY
TECHNIQUE_SYSTEM_OWNER_USER_DISCOVERY
TECHNIQUE_SYSTEM_SERVICES
TECHNIQUE_SYSTEM_SERVICE_DISCOVERY
TECHNIQUE_SYSTEM_SHUTDOWN_REBOOT
TECHNIQUE_SYSTEM_TIME_DISCOVERY
TECHNIQUE_TAINT_SHARED_CONTENT
TECHNIQUE_TEMPLATE_INJECTION
TECHNIQUE_TFTP_BOOT
TECHNIQUE_TIMESTOMP
TECHNIQUE_TIME_BASED_EVASION
TECHNIQUE_TOKEN_IMPERSONATION_THEFT
TECHNIQUE_TRAFFIC_DUPLICATION
TECHNIQUE_TRAFFIC_SIGNALING
TECHNIQUE_TRANSFER_DATA_TO_CLOUD_ACCOUNT
TECHNIQUE_TRANSMITED_DATA_MANIPULATION
TECHNIQUE_TRANSPORT_AGENT
TECHNIQUE_TRUSTED_DEVELOPER_UTILITIES_PROXY_EXECUTION
TECHNIQUE_TRUSTED_RELATIONSHIP
TECHNIQUE_TWO_FACTOR_AUTHENTICATION_INTERCEPTION
TECHNIQUE_UNIX_SHELL
TECHNIQUE_UNSECURED_CREDENTIALS
TECHNIQUE_UNUSED_UNSUPPORTED_CLOUD_REGIONS
TECHNIQUE_USER_ACTIVITY_BASED_CHECKS
TECHNIQUE_USER_EXECUTION
TECHNIQUE_USE_ALTERNATE_AUTHENTICATION_MATERIAL
TECHNIQUE_VALID_ACCOUNTS
TECHNIQUE_VIDEO_CAPTURE
TECHNIQUE_VIRTUALIZATION_SANDBOX_EVASION
TECHNIQUE_VISUAL_BASIC
TECHNIQUE_VNC
TECHNIQUE_WEAKEN_ENCRYPTION
TECHNIQUE_WEAKEN_ENCRYPTION_DISABLE_CRYPTO_HARDWARE
TECHNIQUE_WEAKEN_ENCRYPTION_REDUCE_KEY_SPACE
TECHNIQUE_WEB_COOKIES
TECHNIQUE_WEB_PORTAL_CAPTURE
TECHNIQUE_WEB_PROTOCOLS
TECHNIQUE_WEB_SERVICE
TECHNIQUE_WEB_SESSION_COOKIE
TECHNIQUE_WEB_SHELL
TECHNIQUE_WINDOWS_COMMAND_SHELL
TECHNIQUE_WINDOWS_CREDENTIAL_MANAGER
TECHNIQUE_WINDOWS_FILE_AND_DIRECTORY_PERMISSIONS_MODIFICATION
TECHNIQUE_WINDOWS_MANAGEMENT_INSTRUMENTATION
TECHNIQUE_WINDOWS_REMOTE_MANAGEMENT
TECHNIQUE_WINDOWS_SERVICE
TECHNIQUE_XSL_SCRIPT_PROCESSING