Technique enum.
Fields |
|
---|---|
Name | Description |
ABUSE_ELEVATION_CONTROL_MECHANISM |
|
ACCESS_TOKEN_MANIPULATION |
|
ACCOUNT_MANIPULATION |
|
ACTIVE_SCANNING |
|
CLOUD_ACCOUNTS |
|
CLOUD_GROUPS |
|
COMMAND_AND_SCRIPTING_INTERPRETER |
|
CREATE_OR_MODIFY_SYSTEM_PROCESS |
|
DATA_DESTRUCTION |
|
DEFAULT_ACCOUNTS |
|
DOMAIN_POLICY_MODIFICATION |
|
DYNAMIC_RESOLUTION |
|
EXFILTRATION_OVER_WEB_SERVICE |
|
EXFILTRATION_TO_CLOUD_STORAGE |
|
EXPLOIT_PUBLIC_FACING_APPLICATION |
|
EXTERNAL_PROXY |
|
IMPAIR_DEFENSES |
|
INGRESS_TOOL_TRANSFER |
|
LOCAL_ACCOUNTS |
|
MODIFY_AUTHENTICATION_PROCESS |
|
MODIFY_CLOUD_COMPUTE_INFRASTRUCTURE |
|
MULTI_HOP_PROXY |
|
NATIVE_API |
|
NETWORK_DENIAL_OF_SERVICE |
|
NETWORK_SERVICE_DISCOVERY |
|
PERMISSION_GROUPS_DISCOVERY |
|
PROXY |
|
RESOURCE_HIJACKING |
|
SCANNING_IP_BLOCKS |
|
SHARED_MODULES |
|
SSH_AUTHORIZED_KEYS |
|
STEAL_WEB_SESSION_COOKIE |
|
TECHNIQUE_UNSPECIFIED |
|
UNIX_SHELL |
|
UNSECURED_CREDENTIALS |
|
VALID_ACCOUNTS |