Name Id Theme Description
Public scanning services 38 Recon and weaponization Platforms like Shodan hunt for internet facing devices to perform scanning and enumeration.
Service enumeration 37 Internal recon Network enumeration is a process that involves gathering information about a network such as the hosts, network services, connected devices along with usernames, group information, and related data.
Port scanning 38 Internal recon A port scanner refers to a software application program that scans a server for open ports. It enables auditors and network administrators to examine network security while attackers and hackers use it to identify open ports for exploiting and/or running malicious services on a host computer or server.
Malicious stager 40 Initial compromise A stager is a small payload instructing the computer to pull down the next phase of malicious code.
VPN tunneling 34 Impersonation An adversary can reduce their footprint by using credentials to directly connect to the network as a legitimate user, instead of relying on the RAT.
Trusted third party 39 Impersonation Attackers may compromise a subsidiary organization before moving into the parent organization.
Reverse RDP tunnel 35 Impersonation Reverse RDP tunneling is when an attacker initiates a connection outbound to a server. The attacker can use this server to perform actions on this host.
Certificate impersonation 41 Impersonation In order to avoid detection, attackers may generate a self-signed SSL/TLS certificate that impersonates an entity.
Peer-to-peer 36 Command and control The peer-to-peer(P2P) protocol provides a decentralized command and control technique. A decentralized network allows botnet clients to relay commands to other bots and removes the need of a master server.
Vulnerability scanning 30 Recon and weaponization A vulnerability scan detects and classifies system weaknesses in computers, networks and communications equipment and predicts the effectiveness of countermeasures.
Anonymous services 29 Evasion Anonymous services like TOR can be used to mask the attacker’s identity and location.
IRC 33 Command and control Using internet relay chat(IRC) as a C2 channel.
ICMP 32 Command and control Using ICMP requests and replies as a C2 channel.
Network sniffing 21 Internal recon Network Sniffing involves capturing, decoding, inspecting and interpreting the information inside a network packet on a TCP/IP network. The purpose is to steal information, usually user IDs, passwords, network details, credit card numbers, etc.
SQL Injection 20 Initial compromise SQL stands for structured query language; it’s a programming language used to communicate with databases. Many of the servers that store critical data for websites and services use SQL to manage the data in their databases. A SQL injection attack specifically targets this kind of server, using malicious code to get the server to divulge information it normally wouldn’t. This is especially problematic if the server stores private customer information from the website, such as credit card numbers, usernames and passwords (credentials), or other personally identifiable information, which are tempting and lucrative targets for an attacker.
UDP Flood 12 DOS A UDP Flood is a type of denial-of-service attack in which a large number of User Datagram Protocol (UDP) packets are sent to a targeted server with the aim of overwhelming that device’s ability to process and respond.
TCP Flood 11 DOS A TCP SYN flood is a form of denial-of-service attack in which an attacker sends a succession of SYN requests to a target’s system in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic.
HTTP Flood 10 DOS An HTTP flood attack is a type of volumetric distributed denial-of-service (DDoS) attack designed to overwhelm a targeted server with HTTP requests. Once the target has been saturated with requests and is unable to respond to normal traffic, denial-of-service will occur for additional requests from actual users.
Watering hole 08 Delivery A watering hole attack is a security exploit in which the attacker seeks to compromise a specific group of end users by infecting websites that members of the group are known to visit. The goal is to infect a targeted user’s computer and gain access to the network at the target’s place of employment.
Poisoned torrents 08 Delivery The technique of threat actors deploying torrent files onto torrent sites that are pre-infected with malware has not been widely seen before, especially with respect to BitTorrent-types of attack.
Phishing 7 Delivery Phishing is the practice of sending fraudulent communications that appear to come from a reputable source. It is usually done through email. The goal is to steal sensitive data like credit card and login information or to install malware on the victim’s machine.
DNS 6 Command and control Using DNS queries and responses as a C2 channel.
Exfiltration 2 Actions on objective Data exfiltration is the unauthorized copying, transfer or retrieval of data from a computer or server.
Defacement 1 Actions on objective Website defacement is an attack on a website that changes the visual appearance of the site or a webpage.
WMI 26 Lateral movement Windows management instrumentation (WMI) is a tool that is implemented as a service to locally and remotely manages data, operations and configuring settings on windows operating systems.
WinRM 25 Lateral movement Windows Remote Management (WinRM) is the name of both a Windows service and a protocol that allows a user to interact with a remote system (e.g., run an executable, modify the Registry, modify services).
SSH HiJacking 24 Lateral movement In order to move laterally from a compromised host, adversaries may take advantage of trust relationships established with other systems via public key authentication in active SSH sessions by hijacking an existing connection to another system.
SMB 24 Lateral movement Using the victim credentials the attacker authenticates to the victim machine on port 445 and try to gain access to the Admin$ shares: (C$, IPC$, or ADMIN$). Access to Admin$ allows for remote code execution including arbitrary code.
Remote Desktop 23 Lateral movement Attackers will use valid credentials to move laterally in the environment by utilizing remote desktop.
Exploit 22 Lateral movement An attacker can scan for vulnerable hosts that can be attacked by an exploit. For example, MS08-67 is an exploit that can be used to create a reverse shell on a remote Windows machine.
Exploit 19 Initial compromise An exploit is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized).
Domain spoofing 28 Impersonation Domain Spoofing is a form of phishing, that occurs when an attacker appears to use a company’s domain to impersonate a company or one of its employees.
ARP spoofing 27 Impersonation ARP spoofing is a type of attack in which a malicious actor sends falsified ARP (Address Resolution Protocol) messages over a local area network. This results in the linking of an attacker’s MAC address with the IP address of a legitimate computer or server on the network.
Public services 18 Evasion The malware may communicate with public services such as Google or Dropbox. These services can be used for the staging of malware or C2 communication.
Encryption 17 Evasion Threat actors may utilize encryption to thwart security controls from reading/interpreting the data in transit.
Encoding 16 Evasion Encoding is the process of putting a sequence of characters (letters, numbers, punctuation, and certain symbols) into a specialized format for efficient transmission or storage.
Custom protocol 15 Evasion Threat actors may create custom protocols to thwart security controls from reading/interpreting the data in transit.
Custom obfuscation 14 Evasion Threat actors may create custom obfuscation(encryption, encoding, and hashing) mechanisms to thwart defenders.
Compression 13 Evasion Compression is the act of reducing the number of bits needed to represent data.
Webshell 31 Command and control A web shell is a script that can be uploaded to a web server to enable remote administration of the machine.
Remote Admin Tools 5 Command and control Remote Administration tools like TeamViewer can be used to control a machine remotely. Tools like TeamViewer are legitimate applications that are signed and may be trusted by security controls.
Listening Service 4 Command and control
HTTP 3 Command and control Command and control server uses a full web backend that lets the attacker directly control the victims via a web browser. These HTTP channels may be plain-text or encrypted with SSL.