KnownTechniques enum
Known values of Techniques that the service accepts.
Fields
AbuseElevationControlMechanism | |
AccessTokenManipulation | |
AccountDiscovery | |
AccountManipulation | |
ActiveScanning | |
ApplicationLayerProtocol | |
AudioCapture | |
BootOrLogonAutostartExecution | |
BootOrLogonInitializationScripts | |
BruteForce | |
CloudInfrastructureDiscovery | |
CloudServiceDashboard | |
CloudServiceDiscovery | |
CommandAndScriptingInterpreter | |
CompromiseClientSoftwareBinary | |
CompromiseInfrastructure | |
ContainerAndResourceDiscovery | |
CreateAccount | |
CreateOrModifySystemProcess | |
CredentialsFromPasswordStores | |
DataDestruction | |
DataEncryptedForImpact | |
DataFromCloudStorageObject | |
DataFromConfigurationRepository | |
DataFromInformationRepositories | |
DataFromLocalSystem | |
DataManipulation | |
DataStaged | |
Defacement | |
DeobfuscateDecodeFilesOrInformation | |
DiskWipe | |
DomainTrustDiscovery | |
DriveByCompromise | |
DynamicResolution | |
EndpointDenialOfService | |
EventTriggeredExecution | |
ExfiltrationOverAlternativeProtocol | |
ExploitationForClientExecution | |
ExploitationForCredentialAccess | |
ExploitationForDefenseEvasion | |
ExploitationForPrivilegeEscalation | |
ExploitationOfRemoteServices | |
ExploitPublicFacingApplication | |
ExternalRemoteServices | |
FallbackChannels | |
FileAndDirectoryDiscovery | |
FileAndDirectoryPermissionsModification | |
GatherVictimNetworkInformation | |
HideArtifacts | |
HijackExecutionFlow | |
ImpairDefenses | |
ImplantContainerImage | |
IndicatorRemovalOnHost | |
IndirectCommandExecution | |
IngressToolTransfer | |
InputCapture | |
InterProcessCommunication | |
LateralToolTransfer | |
ManInTheMiddle | |
Masquerading | |
ModifyAuthenticationProcess | |
ModifyRegistry | |
NetworkDenialOfService | |
NetworkServiceScanning | |
NetworkSniffing | |
NonApplicationLayerProtocol | |
NonStandardPort | |
ObfuscatedFilesOrInformation | |
ObtainCapabilities | |
OfficeApplicationStartup | |
OSCredentialDumping | |
PermissionGroupsDiscovery | |
Phishing | |
PreOSBoot | |
ProcessDiscovery | |
ProcessInjection | |
ProtocolTunneling | |
Proxy | |
QueryRegistry | |
RemoteAccessSoftware | |
RemoteServices | |
RemoteServiceSessionHijacking | |
RemoteSystemDiscovery | |
ResourceHijacking | |
ScheduledTaskJob | |
ScreenCapture | |
SearchVictimOwnedWebsites | |
ServerSoftwareComponent | |
ServiceStop | |
SignedBinaryProxyExecution | |
SoftwareDeploymentTools | |
SQLStoredProcedures | |
StealOrForgeKerberosTickets | |
SubvertTrustControls | |
SupplyChainCompromise | |
SystemInformationDiscovery | |
TaintSharedContent | |
TrafficSignaling | |
TransferDataToCloudAccount | |
TrustedRelationship | |
UnsecuredCredentials | |
UserExecution | |
ValidAccounts | |
WindowsManagementInstrumentation |