πŸ““
πŸ““
πŸ““
πŸ““
Red Team Notes 2.0
Search…
πŸ““
πŸ““
πŸ““
πŸ““
Red Team Notes 2.0
Introduction
Red Team
Red Team Techniques
Initial Access
Execution
Persistence
Privilege Escalation
Defense Evasion
Credential Access
Discovery
T1124: System Time Discovery
T1007: System Service Disvcovery
T1033: System Owner/User Directory
T1049: System Network Connections Discovery
T1016: System Network Configuration Discovery
T1082: System Information Discovery
T1518: Software Discovery
T1018: Remote System Discovery
T1012: Query Registry
T1057: Process Discovery
T1069: Permissions Groups Discovery
T1120: Peripheral Device Discovery
T1201: Password Policy Discovery
T1040: Network Sniffing
T1135: Network Share Discovery
T1046: Network Servie Scanning
T1083: File and Directory Discovery
T1486: Domain Trust Discovery
T1217: Browser Bookmark Discovery
T1010: Application Window Discovery
T1087: Account Discovery
Domain Account
Local Account
Lateral Movement
Active Directory
Active Directory
Active Directory Attacks
Red Team Infrastructure
RED TEAM INFRASTRUCTURE
Domain Name and Categorization
Reconnaissance
Weaponization
Delivery
Situational Awareness
Credential Dumping
Persistence
Defense Evasion
Privilege Escalation
Lateral Movement
Powered By GitBook
T1087: Account Discovery
Adversaries may attempt to get a listing of accounts on a system or within an environment. This information can help adversaries determine which accounts exist to aid follow-on behavior.
Previous
T1010: Application Window Discovery
Next
Domain Account
Last modified 1yr ago
Copy link