Nature | Type | ID | Name |
---|---|---|---|
ParentOf | S | 542 | Targeted Malware |
CanFollow | D | 561 | Windows Admin Shares with Stolen Credentials |
CanFollow | D | 644 | Use of Captured Hashes (Pass The Hash) |
Scope | Likelihood | Impact | Note |
---|---|---|---|
ConfidentialityIntegrityAvailability | N/A | Execute Unauthorized Commands | Run Arbitrary Code |
ConfidentialityIntegrityAvailability | N/A | Other | Depending on the type of code executed by the adversary, the consequences of this attack pattern can vary widely. |
Taxonomy Name | Entry ID | Entry Name |
---|