Joined Adversary Simulation Manual
search
⌘Ctrlk
Joined Adversary Simulation Manual
  • Joined Adversary Simulation Manual
  • Reconnaissance
  • Resource Development
  • Initial Access
  • Execution
  • Persistence
  • Privilege Escalation
  • Defense Evasion
  • Credential Access
  • Discovery
  • Lateral Movement
  • Collection
    • Archive Collected Data
    • Audio Capture
    • Automated Collection
    • Clipboard Data
    • Data from Cloud Storage Object
    • Data from Configuration Repository
    • Data from Information Repositories
    • Data from Local System
    • Data from Network Shared Drive
    • Data from Removable Media
    • Data Staged
    • Email Collection
    • Input Capture
    • Man in the Browser
    • Man-in-the-Middle
    • Screen Capture
    • Video Capture
  • Command and Control
  • Exfiltration
  • Impact
  • General Pentesting
  • Tricks
  • Tools
  • Contributors
  • Kudos, References and Further Reading
gitbookPowered by GitBook
block-quoteOn this pagechevron-down

Collection

Archive Collected Datachevron-rightAudio Capturechevron-rightAutomated Collectionchevron-rightClipboard Datachevron-rightData from Cloud Storage Objectchevron-rightData from Configuration Repositorychevron-rightData from Information Repositorieschevron-rightData from Local Systemchevron-rightData from Network Shared Drivechevron-rightData from Removable Mediachevron-rightData Stagedchevron-rightEmail Collectionchevron-rightInput Capturechevron-rightMan in the Browserchevron-rightMan-in-the-Middlechevron-rightScreen Capturechevron-rightVideo Capturechevron-right
PreviousUse Alternate Authentication Materialchevron-leftNextArchive Collected Datachevron-right

Last updated 4 years ago

Was this helpful?

Was this helpful?