Cybersecurity Ontology Shield Cybersecurity Ontology

Category: Attack

Browsing 31 concepts

Found 31 matches
Brute Force preferred
Attack

Technique T1110: Adversaries attempt to guess passwords.

Attack

An attack that involves guessing passwords or keys.

Attack

The automated injection of breached username/password pairs in order to fraudulently gain access to user accounts.

DDoS Attack preferred
Attack

Distributed Denial of Service attack.

Malware preferred
Attack

A type of malicious code or software intended to harm or compromise the confidentiality, integrity, or availability of a victim's device or data.

Attack

Adversaries may attempt to dump credentials to obtain account login and credential material.

Attack

Adversaries may use fallback or alternate communication channels if the primary channel is compromised or inaccessible.

Attack

Adversaries may inject code into processes in order to evade process-based defenses as well as possibly elevate privileges.

Attack

Adversaries may use methods of capturing user input to obtain credentials.

Attack

Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.

Attack

Adversaries may attempt to find a listing of groups and permission settings.

Attack

Adversaries may obtain and abuse credentials of existing accounts as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.

Attack

Adversaries may use brute force techniques to attempt to gain access to accounts when they do not know the password or when the password is not strong.

Attack

Adversaries may target multi-factor authentication (MFA) mechanisms to gain access to credentials.

Attack

Adversaries may gather credential material by evoking an authentication process that provides the material.

Attack

Adversaries may attempt to obtain the password policy in use to aid in credential guessing.

Attack

Adversaries may exploit software vulnerabilities to gain access to credential material.

Attack

Adversaries may destroy data and files on specific systems or in large numbers on a network to interrupt availability to systems, services, and network resources.

Attack

Adversaries may encrypt data on target systems or on large numbers of systems in a network to interrupt availability to system and network resources.

Attack

Adversaries may leverage the resources of co-opted systems in order to solve resource intensive problems which may impact system and/or hosted service availability.

Attack

Adversaries may perform Network Denial of Service (DoS) attacks to degrade or block the availability of targeted resources.

Attack

Adversaries may perform Endpoint Denial of Service (DoS) attacks to degrade or block the availability of services on a victim system.

Attack

Adversaries may interrupt availability of system and network resources by inhibiting access to accounts utilized by legitimate users.

Attack

Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by a specific event.

Attack

Adversaries may circumvent mechanisms designed to control elevation of privileges to gain higher-level permissions.

Attack

Adversaries may use alternate authentication material, such as password hashes, Kerberos tickets, and application access tokens, to move laterally and bypass access controls.

Attack

Adversaries may search compromised systems to find and obtain insecurely stored credentials.

Attack

Adversaries may search for common password storage locations to obtain user credentials.

Attack

Adversaries may modify authentication mechanisms and processes to bypass access controls.

Attack

Adversaries may manipulate data on target systems to influence the integrity of information.

Test-DDoS preferred
Attack

A test DDoS attack.