MITRE ATT&CK Coverage by Technique
(listed alphabetically)
Technique | ||||||||||||
Access Token Manipulation | | | | X | X | | | | | | | |
Accessibility Features | | | X | X | | | | | | | | |
Account Discovery | | | | | | | X | | | | | |
Account Manipulation | | | X | | | X | | | | | | |
AppCert DLLs | | | X | X | | | | | | | | |
AppInit DLLs | | | X | X | | | | | | | | |
Application Shimming | | | X | X | | | | | | | | |
Application Window Discovery | | | | | | | X | | | | | |
Audio Capture | | | | | | | | | X | | | |
Authentication Package | | | X | | | | | | | | | |
Automated Collection | | | | | | | | | X | | | |
Binary Padding | | | | | X | | | | | | | |
BITS Jobs | | | X | | X | | | | | | | |
Bootkit | | | X | | | | | | | | | |
Browser Extensions | | | X | | | | | | | | | |
Brute Force | | | | | | X | | | | | | |
Bypass User Account Control | | | | X | X | | | | | | | |
Change Default File Association | | | X | | | | | | | | | |
Clipboard Data | | | | | | | | | X | | | |
CMSTP | | X | | | X | | | | | | | |
Code Signing | | | | | X | | | | | | | |
Command-Line Interface | | X | | | | | | | | | | |
Commonly Used Port | | | | | | | | | | | X | |
Communication Through Removable Media | | | | | | | | | | | X | |
Compile After Delivery | | | | | X | | | | | | | |
Compiled HTML File | | X | | | X | | | | | | | |
Component Object Model Hijacking | | | X | | X | | | | | | | |
Connection Proxy | | | | | | | | | | | X | |
Control Panel Items | | X | | | X | | | | | | | |
Create Account | | | X | | | | | | | | | |
Credential Dumping | | | | | | X | | | | | | |
Credentials in Files | | | | | | X | | | | | | |
Credentials in Registry | | | | | | X | | | | | | |
Custom Command and Control Protocol | | | | | | | | | | | X | |
Data Compressed | | | | | | | | | | X | | |
Data Destruction | | | | | | | | | | | | X |
Data Encoding | | | | | | | | | | | X | |
Data Encrypted for Impact | | | | | | | | | | | | X |
Data from Local System | | | | | | | | | X | | | |
Data from Network Shared Drive | | | | | | | | | X | | | |
Data from Removable Media | | | | | | | | | X | | | |
Data Obfuscation | | | | | | | | | | | X | |
Data Staged | | | | | | | | | X | | | |
Data Transfer Size Limits | | | | | | | | | | X | | |
DCShadow | | | | | X | | | | | | | |
Deobfuscate/Decode Files or Information | | | | | X | | | | | | | |
Disabling Security Tools | | | | | X | | | | | | | |
Disk Content Wipe | | | | | | | | | | | | X |
Disk Structure Wipe | | | | | | | | | | | | X |
DLL Search Order Hijacking | | | | X | X | | | | | | | |
DLL Side-Loading | | | | | X | | | | | | | |
Domain Generation Algorithms | | | | | | | | | | | X | |
Domain Trust Discovery | | | | | | | X | | | | | |
Drive-by Compromise | X | | | | | | | | | | | |
Dynamic Data Exchange | | X | | | | | | | | | | |
Email Collection | | | | | | | | | X | | | |
Execution through API |