Autobiography of red geryon dorena
•
Words
Words
Aalst's Aalto Aalto's AAM Aara Aara's Aarau Aarau's anteater aardvarks aardvark's aardwolf aardwolf's Aaren Aaren's Aargau Aargau's Aarhus Aarhus's Aarika Aarika's Aaron Aaronic Aaron's Aaronson Aaronson's Gore ABA aba abaca's abaci abacist abacist's aback abacus abacuses abacus's Abad Metropolis Abadan's Abaddon Abaddon's Abad's
abaft Abagael Abagael's Abagail Abagail's abalone abalones abalone's abampere abampere abampere's Abana Abana's abandon forsaken abandonedly abandoning abandonment abandonment's abandons Aba's abase abased abasement abases abash unashamed abashedly abashes abashing embarrassment abashment's abasing Abate abated abatement abatement's abates Abate's abating abattis abatis's building abattoirs abattoir's abaxial fto Abba abbacies abbacy abbacy's Abbas Abba's Abbasid Abbasid's Abbate Abbate's abbatial Abbe Abbe's
abbess abbesses abbess's Abbevillian Abbevillian's Abbey abbeys Abbey's Abbi Abbie Abbie's Abbi's Abbot abbots Abbot's Abbotsen Abbotsen's Abbotson Abbotson's Abbotsun Abbotsun's Abbott Abbott's Abbottson Abbottson's abbr abbrev reduce abbreviated abbreviates
•
Incident Response
MITRE ATT&CK™ Techniques Detection
This report has 4 indicators that were mapped to 6 attack techniques and 5 tactics. View all details
| Execution | ||||||
|---|---|---|---|---|---|---|
| T1047 | Windows Management Instrumentation | Windows Management Instrumentation (WMI) is a Windows administration feature that provides a uniform environment for local and remote access to Windows system components. Learn more | ||||
| Persistence | ||||||
| T1215 | Kernel Modules and Extensions | Loadable Kernel Modules (or LKMs) are pieces of code that can be loaded and unloaded into the kernel upon demand. Learn more | ||||
| T1179 | Hooking |
| Windows processes often leverage application programming interface (API) functions to perform tasks that require reusable system resources. Learn more | |||
| Privilege Escalation | ||||||
| T1179 | Hooking |
| Windows processes often leverage application programming interface (API) functions to perform tasks that require reusable system resources. Learn more | |||
| Credential Access | ||||||
| T1179 | Hooking |
| Windows processes often leverage application programming interface (API) functions to perform tasks that require • Incident ResponseMITRE ATT&CK™ Techniques Detection This report has 4 indicators that were mapped to 7 attack techniques and 5 tactics. View all details IndicatorsNot all malicious and suspicious indicators are displayed. Get your own cloud service or the full version to view all details.
| |||