ATT&CK Database

Name ATT&CK Tactics & Techniques Status Update ATT&CK Version
Add command to .bashrc Persistence:
Event Triggered Execution: .bash_profile and .bashrc


Privilege Escalation:
Event Triggered Execution: .bash_profile and .bashrc


Add
This ability adds a command to the .bashrc file of the current user. V10
Archive Collected Credentials Collection:
Archive Collected Data


Add
This ability archives collected credentials. V10
Create a Run Key in the HKLM Hive Persistence:
Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder


Privilege Escalation:
Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder


Add
This ability creates a HTTP server on port 9090. V10
Delete Prefetch File Defense Evasion:
Indicator Removal: File Deletion


Add
This ability deletes a single prefetch file.. V10
Delete System Log Files Defense Evasion:
Indicator Removal on Host: Clear Linux or Mac System Logs


Add
This ability deletes the system log file using unlink utility. Elevation Required. V10
Disable LSA Protection Defense Evasion:
Impair Defenses


Add
This ability adds a registry entry to disable LSA Protection. V10
Discover NTLM Users Remote Discovery:
Account Discovery: Domain Account


Add
This ability discovers users who have authenticated against a Domain Controller via NTLM. V10
Enabling Restricted Admin Mode Defense Evasion:
Modify Registry


Add
This ability enables restricted administrative mode. V10
Enumerate COM Objects in Registry Discovery:
Query Registry


Add
This ability enumerates the COM objects listed in HKCR. V10
Execute base64 encoded commands Defense Evasion:
Deobfuscate/Decode Files or Information


Add
This ability decodes the encoded text using Base64 and passes it to the bash shell interpreter to execute the shell script. V10
Forcing WDigest to Store Credentials in Plaintext Defense Evasion:
Modify Registry


Add
This ability modifies the registry key to force the WDigest to store credentials in plaintext. V10
Identify Domain Trusts Discovery:
Domain Trust Discovery


Add
This ability identifies domain trusts with PowerView. V10
Install agent as domain administrator Persistence:
Create or Modify System Process: Windows Service


Add
This ability uses the credentials collected by Powerkatz to install agent as a domain administrator. V10
Install agent in remote host Lateral Movement:
Remote Services: SMB/Windows Admin Shares


Add
This ability copies agent to remote host and start it. V10
List macOS Firewall Rules Discovery:
System Network Configuration Discovery


Add
This ability tests if the macOS firewall is enabled and/or show what rules are configured. V10
Listing AD Infrastructure Discovery:
Domain Trust Discovery


Add
Iterative AD discovery toolkit for offensive operators. V10
Mount Share and Copy File Lateral Movement:
Remote Services: SMB/Windows Admin Shares


Add
This ability mounts a windows share in remote host and copy files to it. V10
Pad Binary to Change Hash using truncate command Defense Evasion:
Obfuscated Files or Information: Binary Padding


Add
This ability uses truncate to add a byte to the binary to change the hash. V10
Persistence using CommandProcessor AutoRun key Persistence:
Event Triggered Execution


Privilege Escalation:
Event Triggered Execution


Add
This ability uses the CommandProcessor AutoRun registry key to persist. V10
Remote Host Ping Persistence:
Create or Modify System Process: Windows Service


Add
This ability to ping a remote host to see if it is accessible. V10
Setting the HISTFILESIZE environment variable Defense Evasion:
Impair Defenses: Impair Command History Logging


Add
This ability sets HISTFILESIZE to 0 and then restore it. V10
Tamper with Windows Defender Registry Defense Evasion:
Impair Defenses: Disable or Modify Tools


Add
This ability disables Windows Defender from starting after a reboot. V10
1 min Sleep Defense Evasion:
Virtualization/Sandbox Evasion: Time Based Evasion


Mod
This ability pauses all operations to avoid making noise. V10
Add Command to .bashrc Persistence:
Event Triggered Execution: Unix Shell Configuration Modification


Privilege Escalation:
Event Triggered Execution: Unix Shell Configuration Modification


Mod
This ability adds a command to the .bashrc file of the current user. V10
Add Command to .bash_profile Persistence:
Event Triggered Execution: Unix Shell Configuration Modification


Privilege Escalation:
Event Triggered Execution: Unix Shell Configuration Modification


Mod
This ability adds a command to the .bash_profile file of the current user. V10
Add Malicious StubPath Value to Existing Active Setup Entry Persistence:
Boot or Logon Autostart Execution: Active Setup


Privilege Escalation:
Boot or Logon Autostart Execution: Active Setup


Mod
This ability adds a StubPath entry to the Active Setup native registry key. V10
Add Port Monitor Persistence in Registry Persistence:
Boot or Logon Autostart Execution: Port Monitors


Privilege Escalation:
Boot or Logon Autostart Execution: Port Monitors


Mod
This ability adds key-value pair to a Windows Port Monitor registry. V10
Add Script to Cron Subfolders Execution:
Scheduled Task/Job: Cron


Persistence:
Scheduled Task/Job: Cron


Privilege Escalation:
Scheduled Task/Job: Cron


Mod
This ability adds a script to /etc/cron.daily folder configured to execute on a schedule. V10
Append Malicious Start-Process Cmdlet Persistence:
Event Triggered Execution: PowerShell Profile


Privilege Escalation:
Event Triggered Execution: PowerShell Profile


Mod
This ability appends a start process cmdlet to the current user's powershell profile. V10
Avoid Logs Defense Evasion:
Indicator Removal on Host: Clear Command History


Mod
This ability prevents terminal from logging history. V10
Base64 Decoding with Shell Utilities Defense Evasion:
Deobfuscate/Decode Files or Information


Mod
This ability uses common shell utilities to decode a base64-encoded text string. V10
Base64 Encoded Data Command and Control:
Data Encoding: Standard Encoding


Mod
This ability creates a test file with base64-encoded content. V10
Binary Packed by UPX Defense Evasion:
Obfuscated Files or Information: Software Packing


Mod
This ability copies and then runs a simple binary packed by UPX. V10
Bits Download using desktopimgdownldr.exe Persistence:
BITS Jobs


Defense Evasion:
BITS Jobs


Mod
This ability simulates using desktopimgdownldr.exe to download a malicious file. V10
Brute Force Credentials of Single Active Directory Domain User Credential Access:
Brute Force: Password Guessing


Mod
This ability attempts to brute force Active Directory domain user on a domain controller. V10
Change File Mode Defense Evasion:
File and Directory Permissions Modification: Linux and Mac File and Directory Permissions Modification


Mod
This ability changes a file's permissions using chmod and a specified numeric mode. V10
Check Analysis Environment Processes Defense Evasion:
File and Directory Permissions Modification: Linux and Mac File and Directory Permissions Modification


Mod
This ability checks for analysis/sandbox environment processes. V10
Copy File To Removable Media Initial Access:
Replication Through Removable Media


Lateral Movement:
Replication Through Removable Media


Mod
This ability simulates an adversary copying malware to all connected removable drives. V10
Discover Local Hosts Discovery:
Remote System Discovery


Mod
This ability reboot system. Note that running this ability will REBOOT THE SYSTEM. V10
Get credentials with Powerkatz Credential Access:
OS Credential Dumping: LSASS Memory


Mod
This ability uses Invoke-Mimikatz to collect credentials on the target machine. V10
Reboot System Impact:
System Shutdown/Reboot


Mod
This ability reboot system. Note that running this ability will REBOOT THE SYSTEM. V10