There are currently 185 techniques and 367 sub-techniques in the Enterprise ATT&CK matrix, and Mitre continuously adds more. For example, if the tactic is privilege escalation, the techniques will be various ways attackers carry out privilege escalation in real world attacks. Techniques represent the “how”-how attackers carry out a tactic in practice. Each tactic includes a set of techniques that have been seen used by malware and threat actors. The second “T” in ATT&CK stands for techniques. Figure 2: The Mitre Enterprise ATT&CK Matrix shows the tactics in an attack across the top, and individual techniques down each column.
0 Comments
Leave a Reply. |