Tags abuse elevation control mechanism1 access token_manipulation1 account discovery3 account manipulation1 active debug code1 active scanning3 additional local or domain groups1 android4 brute force3 ccache files1 cleartext storage of sensitive information1 client-side enforcement of server-side security1 code injection3 code repositories2 collection2 command and control2 command and scripting interpreter5 credential access3 credential stuffing1 credentials in files3 cross site scripting1 data from information repositories2 defense evasion2 deserialization of untrusted data1 develop capabilities1 discovery3 domain account1 domain groups1 domain or tenant policy modification1 email collection1 encrypted/encoded file1 execution6 exfiltration1 exfiltration over c2 channel1 exploit public-facing application4 exploitation for client execution1 exposure of information through directory listing2 file and directory discovery1 gather victim host information3 group policy modification1 hack the box5 improper export of android application components1 incorrect privilege assignment2 ingress tool transfer1 initial access6 insecure storage of sensitive information2 insertion of sensitive information into log file1 insufficiently protected credentials1 javascript1 lateral movement3 linux4 local account2 local accounts1 local email collection1 lua1 make and impersonate token1 malicious file1 malware1 malware analysis1 mobile hacking lab3 network service discovery1 obfuscated files or information1 os command injection2 pass the hash1 pass the ticket1 password cracking2 password spraying1 path traversal1 permission groups discovery1 persistence1 phishing3 powershell1 private keys1 privilege escalation3 protocol tunneling1 reconnaissance3 remote services3 resource development1 scanning ip blocks3 search victim-owned websites3 software3 spearphishing attachment1 spearphishing link1 spreadphishing link1 sql injection2 ssh2 steal or forge authentication certificates1 steal or forge kerbero stickets1 steal web session cookie1 stealth1 sudo and sudo caching1 system owner/user discovery2 unix shell2 unsecured credentials3 use alternate authentication material2 use of hard coded credentials1 use of weak hash1 user execution1 valid accounts2 vulnerability scanning3 weak password requirements1 web session cookie1 windows1 windows remote management1 wordlist scanning1 xml injection1