Tactics
  • Collection
  • Command and Control
  • Credential Access
  • Defense Evasion
  • Discovery
  • Execution
  • Exfiltration
  • Impact
  • Initial Access
  • Lateral Movement
  • Persistence
  • Privilege Escalation
  • Reconnaissance
  • Resource Development

Initial Access

Id Name
64 Cloud Accounts
85 Compromise Hardware Supply Chain
87 Compromise Software Dependencies and Development Tools
88 Compromise Software Supply Chain
132 Default Accounts
155 Domain Accounts
167 Drive-by Compromise
204 Exploit Public-Facing Application
214 External Remote Services
237 Hardware Additions
289 Local Accounts
367 Phishing
411 Replication Through Removable Media
471 Spearphishing Attachment
473 Spearphishing Link
476 Spearphishing via Service
488 Supply Chain Compromise
521 Trusted Relationship
535 Valid Accounts