ATT&CK Navigator View

Table View






Access to Microphone Device

Adversaries might be accessing the microphone in endpoints over the network.

Roberto Rodriguez @Cyb3rWard0g


Active Directory Replication From Non-Domain-Controller Accounts

Adversaries might attempt to pull the NTLM hash of a user via active directory replication apis from a non-domain-controller account with permissions to do so.

Roberto Rodriguez @Cyb3rWard0g


Active Directory Replication User Backdoor

Adversaries with enough permissions (domain admin) might be adding an ACL to the Root Domain for any user to abuse active directory replication services.

Roberto Rodriguez @Cyb3rWard0g


Alternate PowerShell Hosts

Adversaries might be leveraging alternate PowerShell Hosts to execute PowerShell evading traditional PowerShell detections that look for powershell.exe in my environment.

Roberto Rodriguez @Cyb3rWard0g


Basic PowerShell Execution

Adversaries might be leveraging PowerShell to execute code within my environment

Roberto Rodriguez @Cyb3rWard0g


DLL Injection via CreateRemoteThread and LoadLibrary

Adversaries might be injecting a dll to another process to execute code via CreateRemoteThread and LoadLibrary functions.

Roberto Rodriguez @Cyb3rWard0g


Domain DPAPI Backup Key Extraction

Adversaries might be extracting the DPAPI domain backup key from my DC to be able to decrypt any domain user master key files.

Roberto Rodriguez @Cyb3rWard0g


Enable Remote Desktop Conections Registry

Adversaries might be modifying registry key values to enable remote desktop connections in my environment

Roberto Rodriguez @Cyb3rWard0g


Extended NetNTLM Downgrade

Adversaries might be downgrading the challenge/response authentication protocol used for network logons, the minimum security negotiated for applications using NTLMSSP, and security settings that restrict outgoing NTLM traffic to remote servers in my environment

Roberto Rodriguez @Cyb3rWard0g


LSASS Access from Non System Account

Adversaries might be using a non system account to access LSASS and extract credentials from memory.

Roberto Rodriguez @Cyb3rWard0g


PowerShell Remote Session

Adversaries might be leveraging remote powershell sessions to execute code on remote systems throughout my environment

Roberto Rodriguez @Cyb3rWard0g


Remote Interactive Task Manager LSASS Dump

Adversaries might be RDPing to computers in my environment and interactively dumping the memory contents of LSASS with task manager.

Roberto Rodriguez @Cyb3rWard0g


Remote Service Control Manager Handle

Adversaries might be attempting to open up a handle to the service control manager (SCM) database on remote endpoints to check for local admin access in my environment.

Roberto Rodriguez @Cyb3rWard0g


Remote Service creation

Adversaries might be creating new services remotely to execute code and move laterally in my environment

Roberto Rodriguez @Cyb3rWard0g


SAM Registry Hive Handle Request

Adversaries might be getting a handle to the SAM database to extract credentials in my environment

Roberto Rodriguez @Cyb3rWard0g


Service Creation

Adversaries might be creating new services to execute code on a compromised endpoint in my environment

Roberto Rodriguez @Cyb3rWard0g


SysKey Registry Keys Access

Adversaries might be calculating the SysKey from registry key values to decrypt SAM entries

Roberto Rodriguez @Cyb3rWard0g


WDigest Downgrade

Adversaries might have updated the property value UseLogonCredential of HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest to 1 in order to be able to extract clear text passwords from memory contents of lsass.

Roberto Rodriguez @Cyb3rWard0g


WMI Eventing

Adversaries might be leveraging WMI eventing for persistence in my environment.

Roberto Rodriguez @Cyb3rWard0g


WMI Module Load

Adversaries might be leveraging WMI modules to execute WMI tasks bypassing controls monitoring for wmiprvse.exe or wmiapsrv.exe activity

Roberto Rodriguez @Cyb3rWard0g


WMI Win32_Process Class and Create Method for Remote Execution

Adversaries might be leveraging WMI Win32_Process class and method Create to execute code remotely across my environment

Roberto Rodriguez @Cyb3rWard0g