Linux Matrix

Below are the tactics and techniques representing the MITRE ATT&CK® Matrix for Enterprise. The Matrix contains information for the Linux platform.

Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact
8 techniques 8 techniques 16 techniques 11 techniques 22 techniques 14 techniques 21 techniques 7 techniques 14 techniques 16 techniques 8 techniques 13 techniques
Last modified: 01 April 2022
Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact
8 techniques 8 techniques 16 techniques 11 techniques 22 techniques 14 techniques 21 techniques 7 techniques 14 techniques 16 techniques 8 techniques 13 techniques
Last modified: 01 April 2022