githubEdit

Attack Index

Quick reference to attack techniques organized by MITRE ATT&CK tactics and common vulnerability types.

By MITRE ATT&CK Tactic

Initial Access (TA0001)

Technique
Description
Related Section

Phishing

Spearphishing, credential harvesting

Drive-by Compromise

Exploit via malicious website

Exploit Public-Facing App

Web app vulnerabilities

External Remote Services

VPN, RDP exploitation

Valid Accounts

Credential reuse, default creds

Supply Chain Compromise

Package/dependency attacks

Execution (TA0002)

Technique
Description
Related Section

Command Injection

OS command execution

Scripting

PowerShell, Python, Bash

Exploitation for Client Execution

Browser/doc exploits

User Execution

Social engineering execution

Persistence (TA0003)

Technique
Description
Related Section

Account Manipulation

Modify accounts/groups

Boot/Logon Autostart

Registry run keys, startup

Scheduled Task/Job

Cron, Task Scheduler

Web Shell

Persistent web backdoor

Create Account

Add backdoor accounts

Privilege Escalation (TA0004)

Technique
Description
Related Section

Exploitation for Privilege Escalation

Kernel/service exploits

Access Token Manipulation

Token impersonation

Sudo/SUID Abuse

Linux permission abuse

DLL Hijacking

Malicious DLL loading

Bypass UAC

User Account Control bypass

Defense Evasion (TA0005)

Technique
Description
Related Section

Obfuscated Files/Information

Encoding, encryption

Process Injection

Code injection

Indicator Removal

Log clearing

AMSI Bypass

Antimalware bypass

Timestomping

Modify file times

Credential Access (TA0006)

Technique
Description
Related Section

OS Credential Dumping

Mimikatz, LSASS

Credentials from Password Stores

Browser, Keychain

Kerberoasting

SPN ticket cracking

AS-REP Roasting

Pre-auth disabled accounts

Brute Force

Password guessing

Discovery (TA0007)

Technique
Description
Related Section

Network Service Scanning

Port/service discovery

Remote System Discovery

AD enumeration

File and Directory Discovery

Sensitive file search

Cloud Service Discovery

AWS/Azure/GCP enum

Lateral Movement (TA0008)

Technique
Description
Related Section

Remote Services

SSH, RDP, WinRM

Pass the Hash

NTLM hash reuse

Pass the Ticket

Kerberos ticket reuse

Internal Spearphishing

Lateral phishing

Collection (TA0009)

Technique
Description
Related Section

Data from Information Repositories

SharePoint, Confluence

Archive Collected Data

Compression, staging

Screen Capture

Screenshot collection

Exfiltration (TA0010)

Technique
Description
Related Section

Exfiltration Over Web Service

Cloud storage

Exfiltration Over DNS

DNS tunneling

Exfiltration Over Alternative Protocol

ICMP, custom


By Vulnerability Type

Injection Attacks

Attack
Description
Section

SQL Injection

Database query manipulation

Command Injection

OS command execution

LDAP Injection

LDAP query manipulation

XPath Injection

XML query manipulation

SSTI

Template engine injection

NoSQL Injection

MongoDB/CouchDB injection

Header Injection

HTTP header manipulation

CRLF Injection

Response splitting

Cross-Site Attacks

Attack
Description
Section

XSS (Reflected)

Script injection via URL

XSS (Stored)

Persistent script injection

XSS (DOM)

Client-side DOM manipulation

CSRF

Cross-site request forgery

CORS Misconfiguration

Cross-origin resource sharing

Clickjacking

UI redressing

Authentication/Authorization

Attack
Description
Section

Brute Force

Password guessing

Credential Stuffing

Reused credential attacks

Session Fixation

Session ID manipulation

IDOR

Insecure direct object reference

JWT Attacks

Token manipulation

OAuth Flaws

OAuth flow manipulation

MFA Bypass

Multi-factor bypass

Server-Side Attacks

Attack
Description
Section

SSRF

Server-side request forgery

XXE

XML external entity

LFI/RFI

Local/Remote file inclusion

File Upload

Malicious file upload

Deserialization

Insecure deserialization

Request Smuggling

HTTP desync attacks

Cache/Proxy Attacks

Attack
Description
Section

Web Cache Poisoning

Cache manipulation

Web Cache Deception

Cache rule abuse

DNS Rebinding

DNS TTL manipulation

API Attacks

Attack
Description
Section

BOLA

Broken object-level authorization

Mass Assignment

Unexpected parameter binding

GraphQL Attacks

Introspection, batching abuse

Rate Limit Bypass

Throttling circumvention

Active Directory Attacks

Attack
Description
Section

Kerberoasting

SPN ticket cracking

AS-REP Roasting

Pre-auth disabled abuse

Golden Ticket

Forged TGT

Silver Ticket

Forged service ticket

DCSync

Replicate DC credentials

Pass the Hash

NTLM relay

Pass the Ticket

Kerberos ticket reuse

AD CS Abuse

Certificate services attacks

Cloud Attacks

Attack
Description
Section

Metadata Service Abuse

IMDS exploitation

S3 Bucket Misconfiguration

Public bucket access

IAM Privilege Escalation

Permission escalation

Managed Identity Abuse

Token theft

Container Escape

Breakout from containers

Serverless Exploitation

Lambda/Functions abuse

Wireless Attacks

Attack
Description
Section

WPA2 Cracking

Handshake/PMKID attacks

Evil Twin

Rogue access point

Bluetooth Attacks

BLE exploitation

RFID Cloning

Badge duplication

Physical/Social Engineering

Attack
Description
Section

Phishing

Credential harvesting

Vishing

Voice phishing

USB Drops

Malicious USB devices

Tailgating

Physical access

Badge Cloning

RFID/NFC cloning


By CWE (Common Weakness Enumeration)

CWE ID
Name
Section

CWE-78

OS Command Injection

CWE-79

Cross-site Scripting (XSS)

CWE-89

SQL Injection

CWE-94

Code Injection

CWE-98

PHP File Inclusion

CWE-120

Buffer Overflow

CWE-200

Information Exposure

CWE-287

Authentication Issues

CWE-352

Cross-Site Request Forgery

CWE-434

Unrestricted Upload

CWE-502

Deserialization

CWE-611

XXE

CWE-639

IDOR

CWE-918

SSRF


Quick Reference: Attack → Defense Mapping

Attack
Detection
Prevention

SQLi

WAF rules, query logging

Parameterized queries, input validation

XSS

CSP violations, WAF

Output encoding, CSP, sanitization

Command Injection

Process monitoring, syscall audit

Input validation, avoid shell

SSRF

Outbound request monitoring

Allowlisting, network segmentation

LFI/RFI

File access logging

Input validation, chroot

Credential Stuffing

Failed login monitoring

MFA, rate limiting, CAPTCHA

Kerberoasting

Event ID 4769 monitoring

Strong service account passwords

Pass the Hash

NTLM relay detection

Credential Guard, SMB signing

Container Escape

Syscall monitoring (seccomp)

Rootless containers, gVisor


Resources

Last updated

Was this helpful?