Comprehensive knowledge base of adversary tactics and techniques.
Phishing, drive-by compromise, supply chain
Command execution, user execution, scheduled tasks
Registry modifications, scheduled tasks, boot/autostart
Process injection, token manipulation, exploitation
Process injection, masquerading, indicator removal
Credential dumping, keylogging, brute force
System information, network scanning, account discovery
Remote services, internal spearphishing, replication
Lockheed Martin's model for understanding and defending against cyber attacks.
OSINT, network scanning, target research
Malware creation, exploit development, payload preparation
Email, web, USB, social engineering
Vulnerability exploitation, code execution
Malware installation, persistence mechanisms
C2 channels, communication protocols, encryption
Data exfiltration, destruction, ransomware
Detection, prevention, response at each stage
Understanding the most prevalent methods used by attackers.
Email phishing, spear phishing, whaling
False scenarios, impersonation, authority
Physical media, USB drops, curiosity
Service exchange, help desk scams
SQL injection, XSS, CSRF, file upload
Man-in-the-middle, ARP spoofing, DNS poisoning
Hardware implants, keyloggers, shoulder surfing
Compromised software, hardware backdoors
Countermeasures and defensive approaches for each attack stage.