ABOUT
Overview
Use Cases
Mapping Methodology
Scoring Rubric
Related Projects
ATT&CK OBJECTS
Matrix
Tactics
Techniques
MAPPING FRAMEWORKS
About Mappings
Amazon Web Services (AWS)
Azure
CSA Cloud Controls Matrix (CCM)
CRI Profile
Known Exploited Vulnerabilities
Google Cloud Platform (GCP)
Intel vPro
NIST 800-53
M365
VERIS
You're currently viewing ATT&CK Version 12.1 Enterprise and VERIS 1.3.7.
Change versions here.
Home
Mapping Frameworks
VERIS Home
Exploit a misconfiguration (vs vuln or weakness)
VERIS
action.hacking.variety.Exploit misconfig
Mappings
ATT&CK Version
12.1
ATT&CK Domain
Enterprise
VERIS
1.3.7
Change Versions
Capability ID
Capability Description
Mapping Type
ATT&CK ID
ATT&CK Name
action.hacking.variety.Exploit misconfig
Exploit a misconfiguration (vs vuln or weakness)
related-to
T1548.002
Abuse Elevation Control Mechanism: Bypass User Account Control
action.hacking.variety.Exploit misconfig
Exploit a misconfiguration (vs vuln or weakness)
related-to
T1548.003
Abuse Elevation Control Mechanism: Sudo and Sudo Caching
action.hacking.variety.Exploit misconfig
Exploit a misconfiguration (vs vuln or weakness)
related-to
T1548.004
Abuse Elevation Control Mechanism: Elevated Execution with Prompt
action.hacking.variety.Exploit misconfig
Exploit a misconfiguration (vs vuln or weakness)
related-to
T1068
Exploitation for Privilege Escalation
action.hacking.variety.Exploit misconfig
Exploit a misconfiguration (vs vuln or weakness)
related-to
T1190
Exploit Public-Facing Application
action.hacking.variety.Exploit misconfig
Exploit a misconfiguration (vs vuln or weakness)
related-to
T1212
Exploitation for Credential Access
action.hacking.variety.Exploit misconfig
Exploit a misconfiguration (vs vuln or weakness)
related-to
T1558.004
Steal or Forge Kerberos Tickets: AS-REP Roasting
action.hacking.variety.Exploit misconfig
Exploit a misconfiguration (vs vuln or weakness)
related-to
T1574.001
Hijack Execution Flow: DLL Search Order Hijacking
action.hacking.variety.Exploit misconfig
Exploit a misconfiguration (vs vuln or weakness)
related-to
T1574.002
Hijack Execution Flow: DLL Side-Loading
action.hacking.variety.Exploit misconfig
Exploit a misconfiguration (vs vuln or weakness)
related-to
T1574.005
Hijack Execution Flow: Executable Installer File Permissions Weakness
action.hacking.variety.Exploit misconfig
Exploit a misconfiguration (vs vuln or weakness)
related-to
T1574.010
Hijack Execution Flow: Services File Permissions Weakness
action.hacking.variety.Exploit misconfig
Exploit a misconfiguration (vs vuln or weakness)
related-to
T1574.011
Hijack Execution Flow: Services Registry Permissions Weakness