Matrices
Enterprise
Mobile
ICS
Tactics
Enterprise
Mobile
ICS
Techniques
Enterprise
Mobile
ICS
Data Sources
Mitigations
Enterprise
Mobile
ICS
Groups
Software
Campaigns
Resources
General Information
Getting Started
Training
ATT&CKcon
Working with ATT&CK
FAQ
Updates
Versions of ATT&CK
Related Projects
Brand Guide
Blog
Contribute
Search
Currently viewing
ATT&CK v13.1
which was live between April 25, 2023 and October 30, 2023.
Learn more about the versioning system
or
see the live site
.
TECHNIQUES
Enterprise
Reconnaissance
Active Scanning
Scanning IP Blocks
Vulnerability Scanning
Wordlist Scanning
Gather Victim Host Information
Hardware
Software
Firmware
Client Configurations
Gather Victim Identity Information
Credentials
Email Addresses
Employee Names
Gather Victim Network Information
Domain Properties
DNS
Network Trust Dependencies
Network Topology
IP Addresses
Network Security Appliances
Gather Victim Org Information
Determine Physical Locations
Business Relationships
Identify Business Tempo
Identify Roles
Phishing for Information
Spearphishing Service
Spearphishing Attachment
Spearphishing Link
Search Closed Sources
Threat Intel Vendors
Purchase Technical Data
Search Open Technical Databases
DNS/Passive DNS
WHOIS
Digital Certificates
CDNs
Scan Databases
Search Open Websites/Domains
Social Media
Search Engines
Code Repositories
Search Victim-Owned Websites
Resource Development
Acquire Access
Acquire Infrastructure
Domains
DNS Server
Virtual Private Server
Server
Botnet
Web Services
Serverless
Malvertising
Compromise Accounts
Social Media Accounts
Email Accounts
Cloud Accounts
Compromise Infrastructure
Domains
DNS Server
Virtual Private Server
Server
Botnet
Web Services
Serverless
Develop Capabilities
Malware
Code Signing Certificates
Digital Certificates
Exploits
Establish Accounts
Social Media Accounts
Email Accounts
Cloud Accounts
Obtain Capabilities
Malware
Tool
Code Signing Certificates
Digital Certificates
Exploits