Threats Library

Reusable threat definitions (causes on the left side of bow-tie diagrams).

Add Threat

Tags: clear tags
Clear all
7 threats — page 1 of 1
Name Category Tags Description
Server Software Component Persistence Adversaries may abuse legitimate extensible development features of servers to establish persistent … Edit
Server Software Component: IIS Components Persistence Adversaries may install malicious components that run on Internet Information Services (IIS) web ser… Edit
Server Software Component: SQL Stored Procedures Persistence Adversaries may abuse SQL stored procedures to establish persistent access to systems. SQL Stored Pr… Edit
Server Software Component: Terminal Services DLL Persistence Adversaries may abuse components of Terminal Services to enable persistent access to systems. Micros… Edit
Server Software Component: Transport Agent Persistence Adversaries may abuse Microsoft transport agents to establish persistent access to systems. Microsof… Edit
Server Software Component: Web Shell Persistence Adversaries may backdoor web servers with web shells to establish persistent access to systems. A We… Edit
Server Software Component: vSphere Installation Bundles Persistence Adversaries may abuse vSphere Installation Bundles (VIBs) to establish persistent access to ESXi hyp… Edit