filmov
tv
MITRE Attack Framework technique 'Execution' explained under 1 minute

Показать описание
In the Execution phase, The adversary is trying to run malicious code. Execution consists of techniques that result in adversary-controlled code running on a local or remote system.
Techniques that run malicious code are often paired with techniques from all other tactics to achieve broader goals, like exploring a network or stealing data.
Learn more about MITRE:
Check out my MITRE playlist, here I explain MITRE in very basic language (almost non-technical):
Check out the official MITRE website (We are not affiliated to them in any way):
Techniques that run malicious code are often paired with techniques from all other tactics to achieve broader goals, like exploring a network or stealing data.
Learn more about MITRE:
Check out my MITRE playlist, here I explain MITRE in very basic language (almost non-technical):
Check out the official MITRE website (We are not affiliated to them in any way):