Threats Library

Reusable threat definitions (causes on the left side of bow-tie diagrams).

Add Threat

Tags: clear tags
Clear all
6 threats — page 1 of 1
Name Category Tags Description
Pre-OS Boot Defense Evasion Adversaries may abuse Pre-OS Boot mechanisms as a way to establish persistence on a system. During t… Edit
Pre-OS Boot: ROMMONkit Defense Evasion Adversaries may abuse the ROM Monitor (ROMMON) by loading an unauthorized firmware with adversary co… Edit
Pre-OS Boot: TFTP Boot Defense Evasion Adversaries may abuse netbooting to load an unauthorized network device operating system from a Triv… Edit
Pre-OS Boot: Bootkit Persistence Adversaries may use bootkits to persist on systems. A bootkit is a malware variant that modifies the… Edit
Pre-OS Boot: Component Firmware Persistence Adversaries may modify component firmware to persist on systems. Some adversaries may employ sophist… Edit
Pre-OS Boot: System Firmware Persistence Adversaries may modify system firmware to persist on systems.The BIOS (Basic Input/Output System) an… Edit