Joined Adversary Simulation Manual
Ctrlk
  • Joined Adversary Simulation Manual
  • Reconnaissance
  • Resource Development
  • Initial Access
  • Execution
  • Persistence
  • Privilege Escalation
  • Defense Evasion
  • Credential Access
  • Discovery
  • Lateral Movement
  • Collection
    • Archive Collected Data
    • Audio Capture
    • Automated Collection
    • Clipboard Data
    • Data from Cloud Storage Object
    • Data from Configuration Repository
    • Data from Information Repositories
    • Data from Local System
    • Data from Network Shared Drive
    • Data from Removable Media
    • Data Staged
    • Email Collection
    • Input Capture
    • Man in the Browser
    • Man-in-the-Middle
    • Screen Capture
    • Video Capture
  • Command and Control
  • Exfiltration
  • Impact
  • General Pentesting
  • Tricks
  • Tools
  • Contributors
  • Kudos, References and Further Reading
Powered by GitBook
On this page

Was this helpful?

Collection

Archive Collected DataAudio CaptureAutomated CollectionClipboard DataData from Cloud Storage ObjectData from Configuration RepositoryData from Information RepositoriesData from Local SystemData from Network Shared DriveData from Removable MediaData StagedEmail CollectionInput CaptureMan in the BrowserMan-in-the-MiddleScreen CaptureVideo Capture
PreviousUse Alternate Authentication MaterialNextArchive Collected Data

Last updated 4 years ago

Was this helpful?