Below are the tactics and techniques representing the MITRE ATT&CK® Matrix for Enterprise covering techniques against network infrastructure devices. The Matrix contains information for the Network platform.
Initial Access | Execution | Persistence | Defense Evasion | Credential Access | Discovery | Collection | Command and Control | Exfiltration | Impact | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
1 techniques | 1 techniques | 3 techniques | 8 techniques | 4 techniques | 8 techniques | 3 techniques | 3 techniques | 1 techniques | 2 techniques | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|
|
|
|
|
|
|
|
|
Initial Access | Execution | Persistence | Defense Evasion | Credential Access | Discovery | Collection | Command and Control | Exfiltration | Impact | ||||||||||||||||||||||||||||||||||||||||
1 techniques | 1 techniques | 3 techniques | 8 techniques | 4 techniques | 8 techniques | 3 techniques | 3 techniques | 1 techniques | 2 techniques | ||||||||||||||||||||||||||||||||||||||||
|
|
|
|
|
|
|