MITRE ATT&CK Coverage by Technique
(listed alphabetically)
Technique | ||||||||||||
Access Token Manipulation | | | | X | X | | | | | | | |
Accessibility Features | | | X | X | | | | | | | | |
Account Discovery | | | | | | | X | | | | | |
Account Manipulation | | | X | | | X | | | | | | |
AppCert DLLs | | | X | X | | | | | | | | |
AppInit DLLs | | | X | X | | | | | | | | |
Application Shimming | | | X | X | | | | | | | | |
Application Window Discovery | | | | | | | X | | | | | |
Audio Capture | | | | | | | | | X | | | |
Authentication Package | | | X | | | | | | | | | |
Automated Collection | | | | | | | | | X | | | |
Binary Padding | | | | | X | | | | | | | |
BITS Jobs | | | X | | X | | | | | | | |
Bootkit | | | X | | | | | | | | | |
Browser Extensions | | | X | | | | | | | | | |
Brute Force | | | | | | X | | | | | | |
Bypass User Account Control | | | | X | X | | | | | | | |
Change Default File Association | | | X | | | | | | | | | |
Clipboard Data | | | | | | | | | X | | | |
CMSTP | | X | | | X | | | | | | | |
Code Signing | | | | | X | | | | | | | |
Command-Line Interface | | X | | | | | | | | | | |
Commonly Used Port | | | | | | | | | | | X | |
Communication Through Removable Media | | | | | | | | | | | X | |
Compile After Delivery | | | | | X | | | | | | | |
Compiled HTML File | | X | | | X | | | | | | | |
Component Object Model Hijacking | | | X | | X | | | | | | | |
Connection Proxy | | | | | | | | | | | X | |
Control Panel Items | | X | | | X | | | | | | | |
Create Account | | | X | | | | | | | | | |
Credential Dumping | | | | | | X | | | | | | |
Credentials in Files | | | | | | X | | | | | | |
Credentials in Registry | | |