BluSapphire
Search…
⌃K

MITRE ATT&CK Coverage by Technique

(listed alphabetically)
Technique
Execution
Discovery
Impact
Access Token Manipulation
X
X
Accessibility Features
X
X
Account Discovery
X
Account Manipulation
X
X
AppCert DLLs
X
X
AppInit DLLs
X
X
Application Shimming
X
X
Application Window Discovery
X
Audio Capture
X
Authentication Package
X
Automated Collection
X
Binary Padding
X
BITS Jobs
X
X
Bootkit
X
Browser Extensions
X
Brute Force
X
Bypass User Account Control
X
X
Change Default File Association
X
Clipboard Data
X
CMSTP
X
X
Code Signing
X
Command-Line Interface
X
Commonly Used Port
X
Communication Through Removable Media
X
Compile After Delivery
X
Compiled HTML File
X
X
Component Object Model Hijacking
X
X
Connection Proxy
X
Control Panel Items
X
X
Create Account
X
Credential Dumping
X
Credentials in Files
X
Credentials in Registry
X
Custom Command and Control Protocol
X
Data Compressed
X
Data Destruction
X
Data Encoding
X
Data Encrypted for Impact
X
Data from Local System
X
Data from Network Shared Drive
X
Data from Removable Media
X
Data Obfuscation
X
Data Staged
X
Data Transfer Size Limits
X
DCShadow
X
Deobfuscate/Decode Files or Information
X
Disabling Security Tools
X
Disk Content Wipe
X
Disk Structure Wipe
X
DLL Search Order Hijacking
X
X
DLL Side-Loading
X
Domain Generation Algorithms
X
Domain Trust Discovery
X
Drive-by Compromise
X
Dynamic Data Exchange
X
Email Collection
X
Execution through API
X
Execution through Module Load
X
Exfiltration Over Alternative Protocol
X
Exfiltration Over Command and Control Channel
X
Exfiltration Over Other Network Medium
X
Exfiltration Over Physical Medium