Category:Execution: Difference between revisions

Category page
(Created page with "The adversary is trying to run malicious code. Execution consists of techniques that result in adversary-controlled code running on a local or remote system. Techniques that run malicious code are often paired with techniques from all other tactics to achieve broader goals, like exploring a network or stealing data. For example, an adversary might use a remote access tool to run a PowerShell script that does Remote System Discovery.")
 
No edit summary
 
(One intermediate revision by one other user not shown)
Line 1: Line 1:
The adversary is trying to run malicious code.
=Description=
 
Execution is a phase in the adversary's operations where the attacker's primary objective is to run malicious code on a local or remote system. This phase involves the use of techniques that result in the successful execution of adversary-controlled code. Execution often pairs with techniques from other tactics to achieve broader goals, such as exploring a network or stealing data. For instance, an adversary might use a remote access tool to run a PowerShell script that performs Remote System Discovery. Execution is a crucial step in the adversary's operations, as it allows the attacker to carry out their malicious activities and achieve their objectives. The success of the execution phase directly affects the success of the overall operation, and it is essential for the adversary to effectively execute their code to achieve their desired outcome.
Execution consists of techniques that result in adversary-controlled code running on a local or remote system. Techniques that run malicious code are often paired with techniques from all other tactics to achieve broader goals, like exploring a network or stealing data. For example, an adversary might use a remote access tool to run a PowerShell script that does Remote System Discovery.

Latest revision as of 14:45, 29 January 2023

Description

Execution is a phase in the adversary's operations where the attacker's primary objective is to run malicious code on a local or remote system. This phase involves the use of techniques that result in the successful execution of adversary-controlled code. Execution often pairs with techniques from other tactics to achieve broader goals, such as exploring a network or stealing data. For instance, an adversary might use a remote access tool to run a PowerShell script that performs Remote System Discovery. Execution is a crucial step in the adversary's operations, as it allows the attacker to carry out their malicious activities and achieve their objectives. The success of the execution phase directly affects the success of the overall operation, and it is essential for the adversary to effectively execute their code to achieve their desired outcome.

Subcategories

This category has only the following subcategory.

Pages in category "Execution"

The following 2 pages are in this category, out of 2 total.