Reconnaissance Resource Development Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact
10 techniques 7 techniques 9 techniques 12 techniques 19 techniques 13 techniques 40 techniques 15 techniques 29 techniques 9 techniques 17 techniques 16 techniques 9 techniques 13 techniques
Last modified: 03 November 2021