Threats Library
Reusable threat definitions (causes on the left side of bow-tie diagrams).
Add Threat
Tags:
clear tags
9 threats — page 1 of 1
| Name | Category | Tags | Description | |
|---|---|---|---|---|
| Remote Services | Lateral Movement | Adversaries may use Valid Accounts to log into a service that accepts remote connections, such as te… | Edit | |
| Remote Services: Cloud Services | Lateral Movement | Adversaries may log into accessible cloud services within a compromised environment using Valid Acco… | Edit | |
| Remote Services: Direct Cloud VM Connections | Lateral Movement | Adversaries may leverage Valid Accounts to log directly into accessible cloud hosted compute infrast… | Edit | |
| Remote Services: Distributed Component Object Model | Lateral Movement | Adversaries may use Valid Accounts to interact with remote machines by taking advantage of Distribut… | Edit | |
| Remote Services: Remote Desktop Protocol | Lateral Movement | Adversaries may use Valid Accounts to log into a computer using the Remote Desktop Protocol (RDP). T… | Edit | |
| Remote Services: SMB/Windows Admin Shares | Lateral Movement | Adversaries may use Valid Accounts to interact with a remote network share using Server Message Bloc… | Edit | |
| Remote Services: SSH | Lateral Movement | Adversaries may use Valid Accounts to log into remote machines using Secure Shell (SSH). The adversa… | Edit | |
| Remote Services: VNC | Lateral Movement | Adversaries may use Valid Accounts to remotely control machines using Virtual Network Computing (VNC… | Edit | |
| Remote Services: Windows Remote Management | Lateral Movement | Adversaries may use Valid Accounts to interact with remote systems using Windows Remote Management (… | Edit |