Category:Resource Development: Difference between revisions

Category page
(Created page with "The adversary is trying to establish resources they can use to support operations. Resource Development consists of techniques that involve adversaries creating, purchasing, or compromising/stealing resources that can be used to support targeting. Such resources include infrastructure, accounts, or capabilities. These resources can be leveraged by the adversary to aid in other phases of the adversary lifecycle, such as using purchased domains to support Command and Cont...")
 
No edit summary
Line 1: Line 1:
The adversary is trying to establish resources they can use to support operations.
=Description=
 
Resource Development is a technique used by adversaries to establish resources that support their operations. This involves the creation, purchase, or compromise/theft of resources that can be leveraged in various phases of the adversary lifecycle. Examples of these resources include infrastructure, accounts, and capabilities. Resource Development plays a critical role in supporting other phases of the adversary's operations, such as the use of purchased domains for Command and Control, email accounts for phishing as part of Initial Access, or stolen code signing certificates for Defense Evasion. In summary, Resource Development is a crucial aspect of the adversary's operations, as it provides the necessary resources to support and facilitate their activities.
Resource Development consists of techniques that involve adversaries creating, purchasing, or compromising/stealing resources that can be used to support targeting. Such resources include infrastructure, accounts, or capabilities. These resources can be leveraged by the adversary to aid in other phases of the adversary lifecycle, such as using purchased domains to support Command and Control, email accounts for phishing as a part of Initial Access, or stealing code signing certificates to help with Defense Evasion.

Revision as of 14:41, 29 January 2023

Description

Resource Development is a technique used by adversaries to establish resources that support their operations. This involves the creation, purchase, or compromise/theft of resources that can be leveraged in various phases of the adversary lifecycle. Examples of these resources include infrastructure, accounts, and capabilities. Resource Development plays a critical role in supporting other phases of the adversary's operations, such as the use of purchased domains for Command and Control, email accounts for phishing as part of Initial Access, or stolen code signing certificates for Defense Evasion. In summary, Resource Development is a crucial aspect of the adversary's operations, as it provides the necessary resources to support and facilitate their activities.

Subcategories

This category has only the following subcategory.