Threats Library
Reusable threat definitions (causes on the left side of bow-tie diagrams).
Add Threat
Tags:
clear tags
3 threats — page 1 of 1
| Name | Category | Tags | Description | |
|---|---|---|---|---|
| System Network Configuration Discovery | Discovery | Adversaries may look for details about the network configuration and settings, such as IP and/or MAC… | Edit | |
| System Network Configuration Discovery: Internet Connection Discovery | Discovery | Adversaries may check for Internet connectivity on compromised systems. This may be performed during… | Edit | |
| System Network Configuration Discovery: Wi-Fi Discovery | Discovery | Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on… | Edit |