MITRE ATT&CK

9 Articles

Explore our comprehensive article on MITRE ATT&CK, a knowledge base for cyber threat behaviors. Uncover insights, uses, and how it improves cyber defense tactics.

RFS
7 Min Read

Startup folder Copy payload to startup folder SharpPersist Registry keys Query and set reg key Can use HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run or HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce Cleanup reg delete “HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run” /v MSUpdate /f Launch programs or set folder items SharpPersist Scheduled task Create, Query and run task Create task the user session is idle for…

RFS
1 Min Read

1. AVET – Anti Virus Evasion Tool Post-process exploits containing executable files targeted for Windows machines to avoid being recognized by antivirus software. 2. CarbonCopy Tool that creates a spoofed certificate of any online website and signs an Executable for AV evasion. 3. Hyperion Runtime…

0 233
1
RFS
1 Min Read

Find existing local admin access for the current user: Hunt for sessions of interesting users on machines where you have access: Search for kerberoastable users: Search for AS-REP roastable users: Look for interesting ACLs within the domain, filtering on a specific user or group you…

0 1163
2
RFS
2 Min Read

Port forwarding using Netsh is a simple process that allows you to remotely access a computer or network from another device. With a few simple commands, you can route traffic from one application to another, and even control how data is sent over the network….

0 287
2
RFS
2 Min Read

Learn about Pass-the-Ticket (PtT) attacks, a sophisticated method used by cybercriminals to compromise network security. Discover how PtT attacks exploit Kerberos authentication in Active Directory environments, enabling unauthorized access and lateral movement. Understand the mechanisms, detection techniques, and preventive measures against PtT attacks. Pass-the-Ticket (PtT)…

0 403
4
RFS
4 Min Read

Learn about the dcsync attack and its potential impact on network security. This comprehensive guide explores the attack’s intricacies, detection mechanisms, and preventive measures to safeguard your organization’s sensitive information from cyber threats. In today’s digital landscape, where cybersecurity threats continue to evolve and new…