Threats Library
Reusable threat definitions (causes on the left side of bow-tie diagrams).
Add Threat
Tags:
clear tags
6 threats — page 1 of 1
| Name | Category | Tags | Description | |
|---|---|---|---|---|
| Pre-OS Boot | Defense Evasion | Adversaries may abuse Pre-OS Boot mechanisms as a way to establish persistence on a system. During t… | Edit | |
| Pre-OS Boot: ROMMONkit | Defense Evasion | Adversaries may abuse the ROM Monitor (ROMMON) by loading an unauthorized firmware with adversary co… | Edit | |
| Pre-OS Boot: TFTP Boot | Defense Evasion | Adversaries may abuse netbooting to load an unauthorized network device operating system from a Triv… | Edit | |
| Pre-OS Boot: Bootkit | Persistence | Adversaries may use bootkits to persist on systems. A bootkit is a malware variant that modifies the… | Edit | |
| Pre-OS Boot: Component Firmware | Persistence | Adversaries may modify component firmware to persist on systems. Some adversaries may employ sophist… | Edit | |
| Pre-OS Boot: System Firmware | Persistence | Adversaries may modify system firmware to persist on systems.The BIOS (Basic Input/Output System) an… | Edit |