bars
🦹
CYBERSECURITY BOOK
search
circle-xmark
⌘
Ctrl
k
github
Edit
chevron-down
🧛♂️
ADVANCED PERSISTENT THREATS - RESEARCH
binoculars
Reconnaissance
chevron-right
pallet-boxes
Resource Development
chevron-right
sign-posts-wrench
Initial Compromise
chevron-right
explosion
Execution
chevron-right
flask-gear
Establish persistence
chevron-right
fingerprint
Escalate privileges
chevron-right
skull-crossbones
Defense Evasion
chevron-right
credit-card
Credential Access
chevron-right
periscope
Discovery
chevron-right
transporter-1
Lateral movement
chevron-right
album-collection
Collection
chevron-right
rectangle-terminal
Command and Control
chevron-right
binary-circle-check
Data exfiltration
chevron-right
person-digging
Impact
chevron-right
Previous
Cheatsheet
chevron-left
Next
Reconnaissance
chevron-right
sun-bright
desktop
moon
sun-bright
desktop
moon