Threats Library

Reusable threat definitions (causes on the left side of bow-tie diagrams).

Add Threat

Tags: clear tags
Clear all
3 threats — page 1 of 1
Name Category Tags Description
Traffic Signaling Defense Evasion Adversaries may use traffic signaling to hide open ports or other malicious functionality used for p… Edit
Traffic Signaling: Port Knocking Defense Evasion Adversaries may use port knocking to hide open ports used for persistence or command and control. To… Edit
Traffic Signaling: Socket Filters Defense Evasion Adversaries may attach filters to a network socket to monitor then activate backdoors used for persi… Edit