Joined Adversary Simulation Manual
Ctrlk
  • Joined Adversary Simulation Manual
  • Reconnaissance
  • Resource Development
  • Initial Access
  • Execution
  • Persistence
  • Privilege Escalation
  • Defense Evasion
    • Abuse Elevation Control Mechanism
    • Access Token Manipulation
    • BITS Jobs
    • Deobfuscate-Decode Files or Information
    • Direct Volume Access
    • Execution Guardrails
    • Exploitation for Defense Evasion
    • File and Directory Permissions Modification
    • Group Policy Modification
    • Hide Artifacts
    • Hijack Execution Flow
    • Impair Defenses
    • Indicator Removal on Host
    • Indirect Command Execution
    • Masquerading
    • Modify Authentication Process
    • Modify Cloud Compute Infrastructure
    • Modify Registry
    • Modify System Image
    • Network Boundary Bridging
    • Obfuscated Files or Information
    • Pre-OS Boot
    • Process Injection
    • Rogue Domain Controller
    • Rootkit
    • Signed Binary Proxy Execution
    • Signed Script Proxy Execution
    • Subvert Trust Controls
    • Template Injection
    • Traffic Signaling
    • Trusted Developer Utilities Proxy Execution
    • Unused-Unsupported Cloud Regions
    • Use Alternate Authentication Material
    • Valid Accounts
    • Virtualization-Sandbox Evasion
    • Weaken Encryption
    • XSL Script Processing
  • Credential Access
  • Discovery
  • Lateral Movement
  • Collection
  • Command and Control
  • Exfiltration
  • Impact
  • General Pentesting
  • Tricks
  • Tools
  • Contributors
  • Kudos, References and Further Reading
Powered by GitBook
On this page

Was this helpful?

Defense Evasion

Abuse Elevation Control MechanismAccess Token ManipulationBITS JobsDeobfuscate-Decode Files or InformationDirect Volume AccessExecution GuardrailsExploitation for Defense EvasionFile and Directory Permissions ModificationGroup Policy ModificationHide ArtifactsHijack Execution FlowImpair DefensesIndicator Removal on HostIndirect Command ExecutionMasqueradingModify Authentication ProcessModify Cloud Compute InfrastructureModify RegistryModify System ImageNetwork Boundary BridgingObfuscated Files or InformationPre-OS BootProcess InjectionRogue Domain ControllerRootkitSigned Binary Proxy ExecutionSigned Script Proxy ExecutionSubvert Trust ControlsTemplate InjectionTraffic SignalingTrusted Developer Utilities Proxy ExecutionUnused-Unsupported Cloud RegionsUse Alternate Authentication MaterialValid AccountsVirtualization-Sandbox EvasionWeaken EncryptionXSL Script Processing
PreviousValid AccountsNextAbuse Elevation Control Mechanism

Last updated 4 years ago

Was this helpful?