Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Tactics
  3. Mobile

Mobile Tactics

Tactics represent the "why" of an ATT&CK technique or sub-technique. It is the adversary's tactical goal: the reason for performing an action. For example, an adversary may want to achieve credential access.

Mobile Tactics: 14
IDNameDescription
TA0027Initial Access The adversary is trying to get into your device.
TA0041Execution The adversary is trying to run malicious code.
TA0028Persistence The adversary is trying to maintain their foothold.
TA0029Privilege Escalation The adversary is trying to gain higher-level permissions.
TA0030Defense Evasion The adversary is trying to avoid being detected.
TA0031Credential Access The adversary is trying to steal account names, passwords, or other secrets that enable access to resources.
TA0032Discovery The adversary is trying to figure out your environment.
TA0033Lateral Movement The adversary is trying to move through your environment.
TA0035Collection The adversary is trying to gather data of interest to their goal.
TA0037Command and Control The adversary is trying to communicate with compromised devices to control them.
TA0036Exfiltration The adversary is trying to steal data.
TA0034Impact The adversary is trying to manipulate, interrupt, or destroy your devices and data.
TA0038Network Effects The adversary is trying to intercept or manipulate network traffic to or from a device.
TA0039Remote Service Effects The adversary is trying to control or monitor the device using remote services.
×

[8]ページ先頭

©2009-2026 Movatter.jp