Threats Library

Reusable threat definitions (causes on the left side of bow-tie diagrams).

Add Threat

Tags: clear tags
Clear all
3 threats — page 1 of 1
Name Category Tags Description
System Network Configuration Discovery Discovery Adversaries may look for details about the network configuration and settings, such as IP and/or MAC… Edit
System Network Configuration Discovery: Internet Connection Discovery Discovery Adversaries may check for Internet connectivity on compromised systems. This may be performed during… Edit
System Network Configuration Discovery: Wi-Fi Discovery Discovery Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on… Edit