Joined Adversary Simulation Manual
Ctrlk
  • Joined Adversary Simulation Manual
  • Reconnaissance
  • Resource Development
  • Initial Access
  • Execution
  • Persistence
  • Privilege Escalation
  • Defense Evasion
  • Credential Access
  • Discovery
  • Lateral Movement
  • Collection
  • Command and Control
  • Exfiltration
  • Impact
    • Account Access Removal
    • Data Destruction
    • Data Encrypted for Impact
    • Data Manipulation
    • Defacement
    • Disk Wipe
    • Endpoint Denial of Service
    • Firmware Corruption
    • Inhibit System Recovery
    • Network Denial of Service
    • Resource Hijacking
    • Service Stop
    • System Shutdown-Reboot
  • General Pentesting
  • Tricks
  • Tools
  • Contributors
  • Kudos, References and Further Reading
Powered by GitBook
On this page

Was this helpful?

Impact

Account Access RemovalData DestructionData Encrypted for ImpactData ManipulationDefacementDisk WipeEndpoint Denial of ServiceFirmware CorruptionInhibit System RecoveryNetwork Denial of ServiceResource HijackingService StopSystem Shutdown-Reboot
PreviousTransfer Data to Cloud AccountNextAccount Access Removal

Last updated 4 years ago

Was this helpful?