KnownTechniques enum

Known values of Techniques that the service accepts.

Fields

AbuseElevationControlMechanism
AccessTokenManipulation
AccountDiscovery
AccountManipulation
ActiveScanning
ApplicationLayerProtocol
AudioCapture
BootOrLogonAutostartExecution
BootOrLogonInitializationScripts
BruteForce
CloudInfrastructureDiscovery
CloudServiceDashboard
CloudServiceDiscovery
CommandAndScriptingInterpreter
CompromiseClientSoftwareBinary
CompromiseInfrastructure
ContainerAndResourceDiscovery
CreateAccount
CreateOrModifySystemProcess
CredentialsFromPasswordStores
DataDestruction
DataEncryptedForImpact
DataFromCloudStorageObject
DataFromConfigurationRepository
DataFromInformationRepositories
DataFromLocalSystem
DataManipulation
DataStaged
Defacement
DeobfuscateDecodeFilesOrInformation
DiskWipe
DomainTrustDiscovery
DriveByCompromise
DynamicResolution
EndpointDenialOfService
EventTriggeredExecution
ExfiltrationOverAlternativeProtocol
ExploitationForClientExecution
ExploitationForCredentialAccess
ExploitationForDefenseEvasion
ExploitationForPrivilegeEscalation
ExploitationOfRemoteServices
ExploitPublicFacingApplication
ExternalRemoteServices
FallbackChannels
FileAndDirectoryDiscovery
FileAndDirectoryPermissionsModification
GatherVictimNetworkInformation
HideArtifacts
HijackExecutionFlow
ImpairDefenses
ImplantContainerImage
IndicatorRemovalOnHost
IndirectCommandExecution
IngressToolTransfer
InputCapture
InterProcessCommunication
LateralToolTransfer
ManInTheMiddle
Masquerading
ModifyAuthenticationProcess
ModifyRegistry
NetworkDenialOfService
NetworkServiceScanning
NetworkSniffing
NonApplicationLayerProtocol
NonStandardPort
ObfuscatedFilesOrInformation
ObtainCapabilities
OfficeApplicationStartup
OSCredentialDumping
PermissionGroupsDiscovery
Phishing
PreOSBoot
ProcessDiscovery
ProcessInjection
ProtocolTunneling
Proxy
QueryRegistry
RemoteAccessSoftware
RemoteServices
RemoteServiceSessionHijacking
RemoteSystemDiscovery
ResourceHijacking
ScheduledTaskJob
ScreenCapture
SearchVictimOwnedWebsites
ServerSoftwareComponent
ServiceStop
SignedBinaryProxyExecution
SoftwareDeploymentTools
SQLStoredProcedures
StealOrForgeKerberosTickets
SubvertTrustControls
SupplyChainCompromise
SystemInformationDiscovery
TaintSharedContent
TrafficSignaling
TransferDataToCloudAccount
TrustedRelationship
UnsecuredCredentials
UserExecution
ValidAccounts
WindowsManagementInstrumentation