Tactics
  • Collection
  • Command and Control
  • Credential Access
  • Defense Evasion
  • Discovery
  • Execution
  • Exfiltration
  • Impact
  • Initial Access
  • Lateral Movement
  • Persistence
  • Privilege Escalation
  • Reconnaissance
  • Resource Development

Lateral Movement

Id Name
19 Application Access Token
82 Component Object Model and Distributed COM
152 Distributed Component Object Model
209 Exploitation of Remote Services
265 Internal Spearphishing
280 Lateral Tool Transfer
352 Pass the Hash
353 Pass the Ticket
394 RDP Hijacking
405 Remote Desktop Protocol
407 Remote Service Session Hijacking
408 Remote Services
411 Replication Through Removable Media
423 SMB/Windows Admin Shares
426 SSH
428 SSH Hijacking
456 Shared Webroot
466 Software Deployment Tools
504 Taint Shared Content
529 Use Alternate Authentication Material
534 VNC
552 Web Session Cookie
559 Windows Remote Management