test_scratch / cti-ATT-CK-v13.1 /enterprise-attack /x-mitre-tactic /x-mitre-tactic--5e29b093-294e-49e9-a803-dab3d73b77dd.json
khoicrtp's picture
Upload 2298 files
5fe70fd
raw
history blame
2 kB
{
"type": "bundle",
"id": "bundle--2904a825-3f86-4ce9-a002-04bac635ae31",
"spec_version": "2.0",
"objects": [
{
"x_mitre_domains": [
"enterprise-attack"
],
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"id": "x-mitre-tactic--5e29b093-294e-49e9-a803-dab3d73b77dd",
"type": "x-mitre-tactic",
"created": "2018-10-17T00:14:20.652Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"external_references": [
{
"external_id": "TA0004",
"url": "https://attack.mitre.org/tactics/TA0004",
"source_name": "mitre-attack"
}
],
"modified": "2021-01-06T14:21:21.641Z",
"name": "Privilege Escalation",
"description": "The adversary is trying to gain higher-level permissions.\n\nPrivilege Escalation consists of techniques that adversaries use to gain higher-level permissions on a system or network. Adversaries can often enter and explore a network with unprivileged access but require elevated permissions to follow through on their objectives. Common approaches are to take advantage of system weaknesses, misconfigurations, and vulnerabilities. Examples of elevated access include: \n\n* SYSTEM/root level\n* local administrator\n* user account with admin-like access \n* user accounts with access to specific system or perform specific function\n\nThese techniques often overlap with Persistence techniques, as OS features that let an adversary persist can execute in an elevated context. ",
"x_mitre_version": "1.0",
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_shortname": "privilege-escalation"
}
]
}