MITRE ATT&CK

The Infection Monkey maps its actions to the MITRE ATT&CK external link knowledge base and, based on this, provides a report detailing the techniques it used along with any recommended mitigations. This helps you simulate an advanced persistent threat (APT) attack on your network and mitigate real attack paths intelligently.

In the following table, we list all the MITRE ATT&CK techniques the Infection Monkey provides info about, categorized by the tactic. You can follow any of the links below to learn more about a specific technique or tactic.

TACTIC TECHNIQUES
Execution external link Command-line Interface external link
Execution Through API external link
Powershell external link
Scripting external link
Service Execution external link
Trap external link
Persistence external link .bash_profile & .bashrc external link
Create Account external link
Hidden Files & Directories external link
Local Job Scheduling external link
Powershell Profile external link
Scheduled Task external link
Setuid & Setgid external link
Defence Evasion external link BITS Job external link
Clear Command History external link
File Deletion external link
File Permissions Modification external link
Timestomping external link
Signed Script Proxy Execution external link
Credential Access external link Brute Force external link
Credential Dumping external link
Private Keys external link
Discovery external link Account Discovery external link
Remote System Discovery external link
System Information Discovery external link
System Network Configuration Discovery external link
Lateral Movement external link Exploitation Of Remote Services external link
Pass The Hash external link
Remote File Copy external link
Remote Services external link
Collection external link Data From Local System external link
Command And Control external link Connection Proxy external link
Uncommonly Used Port external link
Multi-hop Proxy external link
Exfiltration external link Exfiltration Over Command And Control Channel external link