Defense Evasion
Abuse Elevation Control MechanismAccess Token ManipulationBITS JobsDeobfuscate-Decode Files or InformationDirect Volume AccessExecution GuardrailsExploitation for Defense EvasionFile and Directory Permissions ModificationGroup Policy ModificationHide ArtifactsHijack Execution FlowImpair DefensesIndicator Removal on HostIndirect Command ExecutionMasqueradingModify Authentication ProcessModify Cloud Compute InfrastructureModify RegistryModify System ImageNetwork Boundary BridgingObfuscated Files or InformationPre-OS BootProcess InjectionRogue Domain ControllerRootkitSigned Binary Proxy ExecutionSigned Script Proxy ExecutionSubvert Trust ControlsTemplate InjectionTraffic SignalingTrusted Developer Utilities Proxy ExecutionUnused-Unsupported Cloud RegionsUse Alternate Authentication MaterialValid AccountsVirtualization-Sandbox EvasionWeaken EncryptionXSL Script Processing
Last updated