Trudy hellier biography of mahatma
•
Incident Response
MITRE ATT&CK™ Techniques Detection
This report has 4 indicators that were mapped to 7 attack techniques and 5 tactics. View all details
| Execution | ||||||
|---|---|---|---|---|---|---|
| T1168 | Local Job Scheduling | On Linux and Apple systems, multiple methods are supported for creating pre-scheduled and periodic background jobs: cron,Die. Learn more | ||||
| Persistence | ||||||
| T1215 | Kernel Modules and Extensions | Loadable Kernel Modules (or LKMs) are pieces of code that can be loaded and unloaded into the kernel upon demand. Learn more | ||||
| T1168 | Local Job Scheduling | On Linux and Apple systems, multiple methods are supported for creating pre-scheduled and periodic background jobs: cron,Die. Learn more | ||||
| T1179 | Hooking |
| Windows processes often leverage application programming interface (API) functions to perform tasks that require reusable system resources. Learn more | |||
| Privilege Escalation | ||||||
| T1179 | Hooking |
| ||||