Куда я попал?
Техники
There are risks in the Community base
There are risks in the team base
6
8
8
6
7
3
12
14
7
12
- Path Interception by PATH Environment Variable
- Services Registry Permissions Weakness
- DLL
- AppDomainManager
- Path Interception by Search Order Hijacking
- Dynamic Linker Hijacking
- Executable Installer File Permissions Weakness
- Services File Permissions Weakness
- KernelCallbackTable
- Path Interception by Unquoted Path
- Dylib Hijacking
- COR_PROFILER
17
- PowerShell Profile
- LC_LOAD_DYLIB Addition
- Application Shimming
- Installer Packages
- Trap
- Image File Execution Options Injection
- Accessibility Features
- AppCert DLLs
- Windows Management Instrumentation Event Subscription
- Change Default File Association
- Emond
- Unix Shell Configuration Modification
- Component Object Model Hijacking
- AppInit DLLs
- Screensaver
- Udev Rules
- Netsh Helper DLL
6
14
12
6
7
12
- Path Interception by PATH Environment Variable
- Services Registry Permissions Weakness
- DLL
- AppDomainManager
- Path Interception by Search Order Hijacking
- Dynamic Linker Hijacking
- Executable Installer File Permissions Weakness
- Services File Permissions Weakness
- KernelCallbackTable
- Path Interception by Unquoted Path
- Dylib Hijacking
- COR_PROFILER
17
- PowerShell Profile
- LC_LOAD_DYLIB Addition
- Application Shimming
- Installer Packages
- Trap
- Image File Execution Options Injection
- Accessibility Features
- AppCert DLLs
- Windows Management Instrumentation Event Subscription
- Change Default File Association
- Emond
- Unix Shell Configuration Modification
- Component Object Model Hijacking
- AppInit DLLs
- Screensaver
- Udev Rules
- Netsh Helper DLL
5
5
14
11
11
12
14
2
6
10
12
- Path Interception by PATH Environment Variable
- Services Registry Permissions Weakness
- DLL
- AppDomainManager
- Path Interception by Search Order Hijacking
- Dynamic Linker Hijacking
- Executable Installer File Permissions Weakness
- Services File Permissions Weakness
- KernelCallbackTable
- Path Interception by Unquoted Path
- Dylib Hijacking
- COR_PROFILER
17
- Fileless Storage
- Embedded Payloads
- Encrypted/Encoded File
- Stripped Payloads
- Binary Padding
- Junk Code Insertion
- Steganography
- SVG Smuggling
- LNK Icon Smuggling
- Indicator Removal from Tools
- Polymorphic Code
- Compile After Delivery
- HTML Smuggling
- Command Obfuscation
- Software Packing
- Dynamic API Resolution
- Compression
6
5
9
8
6
8
8
4
3
4
Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.