MITRE ATT&CK
MITRE ATT&CK Matrix
14 tactics · 691 techniques · 47 covered by your findings
Coverage
0
1–2
3–5
6–9
10+
Click a technique to see linked findings
Reconnaissance
TA0043 · 10 techniques · 4 covered
Active Scanning
T1595 · 7 findings
Search Open Databases
T1596 · 3 findings
Gather Victim Network Info
T1590 · 2
Phishing for Info
T1598
Search Closed Sources
T1597
Initial Access
TA0001 · 9 techniques · 3 covered
Exploit Public-Facing App
T1190 · 12 findings
Valid Accounts
T1078 · 6
Phishing
T1566 · 3
Hardware Additions
T1200
Replication Removable Media
T1091
Execution
TA0002 · 14 techniques · 5 covered
Command & Scripting Interp
T1059 · 11 findings
Exploitation for Client Exec
T1203 · 4
User Execution
T1204 · 2
Scheduled Task/Job
T1053
Persistence
TA0003 · 19 techniques · 2 covered
Create Account
T1136 · 4
Valid Accounts
T1078 · 2
BITS Jobs
T1197
Boot/Logon Autostart
T1547
Privilege Escalation
TA0004 · 13 techniques · 3 covered
Exploitation for Priv Esc
T1068 · 8 findings
Abuse Elevation Ctrl
T1548 · 2
Access Token Manip
T1134
Defense Evasion
TA0005 · 42 techniques · 1 covered
Impair Defenses
T1562 · 2
Obfuscated Files/Info
T1027
Masquerading
T1036
Credential Access
TA0006 · 17 techniques · 4 covered
Brute Force
T1110 · 14
OS Credential Dumping
T1003 · 6
Creds from Password Store
T1555 · 3
Discovery
TA0007 · 32 techniques
System Info Discovery
T1082
Network Service Scanning
T1046
Lateral Movement
TA0008 · 9 techniques
Remote Services
T1021
Internal Spearphishing
T1534