
MITRE ATT&CK®
Compromising the perimeter


# Attack Stage 1: Initial Access – an example of initial entry and two of the techniques used.
# Attack Stage 2: Execution – once initial access has been achieved, a look at how an attack will start to broaden, via the Execution Tactic.
# Attack Stage 3: Persistence - two Techniques that are used to establish connectivity for ongoing access to a Command & Control server.
# Detect & Defend – Mitigations that MITRE ATT&CK® provides, for the individual Techniques used in the stages of our attack scenario.
DOWNLOAD THE PDF