Threats Library
Reusable threat definitions (causes on the left side of bow-tie diagrams).
Add Threat
Tags:
clear tags
6 threats — page 1 of 1
| Name | Category | Tags | Description | |
|---|---|---|---|---|
| Access Token Manipulation | Defense Evasion | Adversaries may modify access tokens to operate under a different user or system security context to… | Edit | |
| Access Token Manipulation: Create Process with Token | Defense Evasion | Adversaries may create a new process with an existing token to escalate privileges and bypass access… | Edit | |
| Access Token Manipulation: Make and Impersonate Token | Defense Evasion | Adversaries may make new tokens and impersonate users to escalate privileges and bypass access contr… | Edit | |
| Access Token Manipulation: Parent PID Spoofing | Defense Evasion | Adversaries may spoof the parent process identifier (PPID) of a new process to evade process-monitor… | Edit | |
| Access Token Manipulation: SID-History Injection | Defense Evasion | Adversaries may use SID-History Injection to escalate privileges and bypass access controls. The Win… | Edit | |
| Access Token Manipulation: Token Impersonation/Theft | Defense Evasion | Adversaries may duplicate then impersonate another user's existing token to escalate privileges and … | Edit |