Threats Library
Reusable threat definitions (causes on the left side of bow-tie diagrams).
Add Threat
Tags:
clear tags
13 threats — page 1 of 1
| Name | Category | Tags | Description | |
|---|---|---|---|---|
| Process Injection | Defense Evasion | Adversaries may inject code into processes in order to evade process-based defenses as well as possi… | Edit | |
| Process Injection: Asynchronous Procedure Call | Defense Evasion | Adversaries may inject malicious code into processes via the asynchronous procedure call (APC) queue… | Edit | |
| Process Injection: Dynamic-link Library Injection | Defense Evasion | Adversaries may inject dynamic-link libraries (DLLs) into processes in order to evade process-based … | Edit | |
| Process Injection: Extra Window Memory Injection | Defense Evasion | Adversaries may inject malicious code into process via Extra Window Memory (EWM) in order to evade p… | Edit | |
| Process Injection: ListPlanting | Defense Evasion | Adversaries may abuse list-view controls to inject malicious code into hijacked processes in order t… | Edit | |
| Process Injection: Portable Executable Injection | Defense Evasion | Adversaries may inject portable executables (PE) into processes in order to evade process-based defe… | Edit | |
| Process Injection: Proc Memory | Defense Evasion | Adversaries may inject malicious code into processes via the /proc filesystem in order to evade proc… | Edit | |
| Process Injection: Process Doppelgänging | Defense Evasion | Adversaries may inject malicious code into process via process doppelgänging in order to evade proce… | Edit | |
| Process Injection: Process Hollowing | Defense Evasion | Adversaries may inject malicious code into suspended and hollowed processes in order to evade proces… | Edit | |
| Process Injection: Ptrace System Calls | Defense Evasion | Adversaries may inject malicious code into processes via ptrace (process trace) system calls in orde… | Edit | |
| Process Injection: Thread Execution Hijacking | Defense Evasion | Adversaries may inject malicious code into hijacked processes in order to evade process-based defens… | Edit | |
| Process Injection: Thread Local Storage | Defense Evasion | Adversaries may inject malicious code into processes via thread local storage (TLS) callbacks in ord… | Edit | |
| Process Injection: VDSO Hijacking | Defense Evasion | Adversaries may inject malicious code into processes via VDSO hijacking in order to evade process-ba… | Edit |