• Skip to primary navigation
  • Skip to content
  • Skip to footer
Security Content Security Content
  • Detections
  • Analytic Stories
  • Playbooks
  • Blog
  • About
    • Use Case
      • Abuse
      • Account Compromise
      • Adversary Tactics
      • Best Practices
      • Cloud Security
      • Data Destruction
      • Lateral Movement
      • Malware
      • Privilege Escalation
      • Ransomware
      • Unauthorized Software
      • Vulnerability

    Abuse

    Name Technique Tactic
    Brand Monitoring None None
    DNS Amplification Attacks Network Denial of Service, Reflection Amplification Impact
    Data Protection Exfiltration Over Unencrypted Non-C2 Protocol Exfiltration
    Information Sabotage Indicator Removal, Clear Windows Event Logs Defense Evasion
    Netsh Abuse File and Directory Permissions Modification, System Network Connections Discovery, System Owner/User Discovery, System Shutdown/Reboot, System Network Configuration Discovery, Command and Scripting Interpreter Defense Evasion
    • Twitter
    • GitHub
    • Feed
    © 2024 Splunk Threat Research Team (STRT). Powered by Jekyll & Minimal Mistakes.