🦹
CYBERSECURITY BOOK
CtrlK
  • 👽CS && PEN-TESTING BOOK
  • 🦹REAL WORLD && CTF
  • 🦸MISCELLANEOUS
  • 🧛‍♂️ADVANCED PERSISTENT THREATS - RESEARCH
    • Reconnaissance
    • Resource Development
    • Initial Compromise
    • Execution
    • Establish persistence
    • Escalate privileges
    • Defense Evasion
    • Credential Access
    • Discovery
    • Lateral movement
    • Collection
    • Command and Control
    • Data exfiltration
    • Impact
  • 👾THREAT HUNTING - RESEARCH
  • 🦅CISA - INCIDENT RESPONSE PLAYBOOK
Powered by GitBook
Page cover
On this page

Was this helpful?

Edit

🧛‍♂️ADVANCED PERSISTENT THREATS - RESEARCH

ReconnaissanceResource DevelopmentInitial CompromiseExecutionEstablish persistenceEscalate privilegesDefense EvasionCredential AccessDiscoveryLateral movementCollectionCommand and ControlData exfiltrationImpact
PreviousCheatsheetNextReconnaissance

Was this helpful?