pub enum HarmfulChainPattern {
ReadThenExfiltrate,
CredentialHarvest,
ConfigThenExecute,
ReconThenExploit,
PrivilegeChain,
}Expand description
Harmful chain patterns and their scores.
Variants§
ReadThenExfiltrate
Read sensitive data then send externally.
CredentialHarvest
Read credentials then use them in another tool.
ConfigThenExecute
Modify config then execute code (persistence).
ReconThenExploit
Enumerate system then exploit findings.
PrivilegeChain
Multiple privilege escalation steps.
Implementations§
Trait Implementations§
Source§impl Clone for HarmfulChainPattern
impl Clone for HarmfulChainPattern
Source§fn clone(&self) -> HarmfulChainPattern
fn clone(&self) -> HarmfulChainPattern
Returns a duplicate of the value. Read more
1.0.0 · Source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
Performs copy-assignment from
source. Read moreSource§impl Debug for HarmfulChainPattern
impl Debug for HarmfulChainPattern
Source§impl PartialEq for HarmfulChainPattern
impl PartialEq for HarmfulChainPattern
impl Eq for HarmfulChainPattern
impl StructuralPartialEq for HarmfulChainPattern
Auto Trait Implementations§
impl Freeze for HarmfulChainPattern
impl RefUnwindSafe for HarmfulChainPattern
impl Send for HarmfulChainPattern
impl Sync for HarmfulChainPattern
impl Unpin for HarmfulChainPattern
impl UnsafeUnpin for HarmfulChainPattern
impl UnwindSafe for HarmfulChainPattern
Blanket Implementations§
Source§impl<T> BorrowMut<T> for Twhere
T: ?Sized,
impl<T> BorrowMut<T> for Twhere
T: ?Sized,
Source§fn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
Mutably borrows from an owned value. Read more