We trust in security

Blog

We trust in security - Blog

Categoría Initial Access

Initial Access - Drive-by Compromise (T1189)

Introduction This post is the first of a series of posts that will provide a better understanding about the techniques used by adversaries to reach their tactical objectives. We will use MITRE ATT&CK Enterprise Matrix as our framework. Our idea is to explain in every post a technique of each tactic (Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, Command and Control, Exfiltration and Impact).