Class Techniques
java.lang.Object
com.azure.core.util.ExpandableStringEnum<Techniques>
com.azure.resourcemanager.security.models.Techniques
Techniques of the assessment.
-
Field Summary
Modifier and TypeFieldDescriptionstatic final Techniques
Static value Abuse Elevation Control Mechanism for Techniques.static final Techniques
Static value Access Token Manipulation for Techniques.static final Techniques
Static value Account Discovery for Techniques.static final Techniques
Static value Account Manipulation for Techniques.static final Techniques
Static value Active Scanning for Techniques.static final Techniques
Static value Application Layer Protocol for Techniques.static final Techniques
Static value Audio Capture for Techniques.static final Techniques
Static value Boot or Logon Autostart Execution for Techniques.static final Techniques
Static value Boot or Logon Initialization Scripts for Techniques.static final Techniques
Static value Brute Force for Techniques.static final Techniques
Static value Cloud Infrastructure Discovery for Techniques.static final Techniques
Static value Cloud Service Dashboard for Techniques.static final Techniques
Static value Cloud Service Discovery for Techniques.static final Techniques
Static value Command and Scripting Interpreter for Techniques.static final Techniques
Static value Compromise Client Software Binary for Techniques.static final Techniques
Static value Compromise Infrastructure for Techniques.static final Techniques
Static value Container and Resource Discovery for Techniques.static final Techniques
Static value Create Account for Techniques.static final Techniques
Static value Create or Modify System Process for Techniques.static final Techniques
Static value Credentials from Password Stores for Techniques.static final Techniques
Static value Data Destruction for Techniques.static final Techniques
Static value Data Encrypted for Impact for Techniques.static final Techniques
Static value Data from Cloud Storage Object for Techniques.static final Techniques
Static value Data from Configuration Repository for Techniques.static final Techniques
Static value Data from Information Repositories for Techniques.static final Techniques
Static value Data from Local System for Techniques.static final Techniques
Static value Data Manipulation for Techniques.static final Techniques
Static value Data Staged for Techniques.static final Techniques
Static value Defacement for Techniques.static final Techniques
Static value Deobfuscate/Decode Files or Information for Techniques.static final Techniques
Static value Disk Wipe for Techniques.static final Techniques
Static value Domain Trust Discovery for Techniques.static final Techniques
Static value Drive-by Compromise for Techniques.static final Techniques
Static value Dynamic Resolution for Techniques.static final Techniques
Static value Endpoint Denial of Service for Techniques.static final Techniques
Static value Event Triggered Execution for Techniques.static final Techniques
Static value Exfiltration Over Alternative Protocol for Techniques.static final Techniques
Static value Exploit Public-Facing Application for Techniques.static final Techniques
Static value Exploitation for Client Execution for Techniques.static final Techniques
Static value Exploitation for Credential Access for Techniques.static final Techniques
Static value Exploitation for Defense Evasion for Techniques.static final Techniques
Static value Exploitation for Privilege Escalation for Techniques.static final Techniques
Static value Exploitation of Remote Services for Techniques.static final Techniques
Static value External Remote Services for Techniques.static final Techniques
Static value Fallback Channels for Techniques.static final Techniques
Static value File and Directory Discovery for Techniques.static final Techniques
Static value File and Directory Permissions Modification for Techniques.static final Techniques
Static value Gather Victim Network Information for Techniques.static final Techniques
Static value Hide Artifacts for Techniques.static final Techniques
Static value Hijack Execution Flow for Techniques.static final Techniques
Static value Impair Defenses for Techniques.static final Techniques
Static value Implant Container Image for Techniques.static final Techniques
Static value Indicator Removal on Host for Techniques.static final Techniques
Static value Indirect Command Execution for Techniques.static final Techniques
Static value Ingress Tool Transfer for Techniques.static final Techniques
Static value Input Capture for Techniques.static final Techniques
Static value Inter-Process Communication for Techniques.static final Techniques
Static value Lateral Tool Transfer for Techniques.static final Techniques
Static value Man-in-the-Middle for Techniques.static final Techniques
Static value Masquerading for Techniques.static final Techniques
Static value Modify Authentication Process for Techniques.static final Techniques
Static value Modify Registry for Techniques.static final Techniques
Static value Network Denial of Service for Techniques.static final Techniques
Static value Network Service Scanning for Techniques.static final Techniques
Static value Network Sniffing for Techniques.static final Techniques
Static value Non-Application Layer Protocol for Techniques.static final Techniques
Static value Non-Standard Port for Techniques.static final Techniques
Static value Obfuscated Files or Information for Techniques.static final Techniques
Static value Obtain Capabilities for Techniques.static final Techniques
Static value Office Application Startup for Techniques.static final Techniques
Static value OS Credential Dumping for Techniques.static final Techniques
Static value Permission Groups Discovery for Techniques.static final Techniques
Static value Phishing for Techniques.static final Techniques
Static value Pre-OS Boot for Techniques.static final Techniques
Static value Process Discovery for Techniques.static final Techniques
Static value Process Injection for Techniques.static final Techniques
Static value Protocol Tunneling for Techniques.static final Techniques
Static value Proxy for Techniques.static final Techniques
Static value Query Registry for Techniques.static final Techniques
Static value Remote Access Software for Techniques.static final Techniques
Static value Remote Service Session Hijacking for Techniques.static final Techniques
Static value Remote Services for Techniques.static final Techniques
Static value Remote System Discovery for Techniques.static final Techniques
Static value Resource Hijacking for Techniques.static final Techniques
Static value Scheduled Task/Job for Techniques.static final Techniques
Static value Screen Capture for Techniques.static final Techniques
Static value Search Victim-Owned Websites for Techniques.static final Techniques
Static value Server Software Component for Techniques.static final Techniques
Static value Service Stop for Techniques.static final Techniques
Static value Signed Binary Proxy Execution for Techniques.static final Techniques
Static value Software Deployment Tools for Techniques.static final Techniques
Static value SQL Stored Procedures for Techniques.static final Techniques
Static value Steal or Forge Kerberos Tickets for Techniques.static final Techniques
Static value Subvert Trust Controls for Techniques.static final Techniques
Static value Supply Chain Compromise for Techniques.static final Techniques
Static value System Information Discovery for Techniques.static final Techniques
Static value Taint Shared Content for Techniques.static final Techniques
Static value Traffic Signaling for Techniques.static final Techniques
Static value Transfer Data to Cloud Account for Techniques.static final Techniques
Static value Trusted Relationship for Techniques.static final Techniques
Static value Unsecured Credentials for Techniques.static final Techniques
Static value User Execution for Techniques.static final Techniques
Static value Valid Accounts for Techniques.static final Techniques
Static value Windows Management Instrumentation for Techniques. -
Constructor Summary
-
Method Summary
Modifier and TypeMethodDescriptionstatic Techniques
fromString
(String name) Creates or finds a Techniques from its string representation.static Collection<Techniques>
values()
Gets known Techniques values.Methods inherited from class com.azure.core.util.ExpandableStringEnum
equals, fromString, hashCode, toString, values
-
Field Details
-
ABUSE_ELEVATION_CONTROL_MECHANISM
Static value Abuse Elevation Control Mechanism for Techniques. -
ACCESS_TOKEN_MANIPULATION
Static value Access Token Manipulation for Techniques. -
ACCOUNT_DISCOVERY
Static value Account Discovery for Techniques. -
ACCOUNT_MANIPULATION
Static value Account Manipulation for Techniques. -
ACTIVE_SCANNING
Static value Active Scanning for Techniques. -
APPLICATION_LAYER_PROTOCOL
Static value Application Layer Protocol for Techniques. -
AUDIO_CAPTURE
Static value Audio Capture for Techniques. -
BOOT_OR_LOGON_AUTOSTART_EXECUTION
Static value Boot or Logon Autostart Execution for Techniques. -
BOOT_OR_LOGON_INITIALIZATION_SCRIPTS
Static value Boot or Logon Initialization Scripts for Techniques. -
BRUTE_FORCE
Static value Brute Force for Techniques. -
CLOUD_INFRASTRUCTURE_DISCOVERY
Static value Cloud Infrastructure Discovery for Techniques. -
CLOUD_SERVICE_DASHBOARD
Static value Cloud Service Dashboard for Techniques. -
CLOUD_SERVICE_DISCOVERY
Static value Cloud Service Discovery for Techniques. -
COMMAND_AND_SCRIPTING_INTERPRETER
Static value Command and Scripting Interpreter for Techniques. -
COMPROMISE_CLIENT_SOFTWARE_BINARY
Static value Compromise Client Software Binary for Techniques. -
COMPROMISE_INFRASTRUCTURE
Static value Compromise Infrastructure for Techniques. -
CONTAINER_AND_RESOURCE_DISCOVERY
Static value Container and Resource Discovery for Techniques. -
CREATE_ACCOUNT
Static value Create Account for Techniques. -
CREATE_OR_MODIFY_SYSTEM_PROCESS
Static value Create or Modify System Process for Techniques. -
CREDENTIALS_FROM_PASSWORD_STORES
Static value Credentials from Password Stores for Techniques. -
DATA_DESTRUCTION
Static value Data Destruction for Techniques. -
DATA_ENCRYPTED_FOR_IMPACT
Static value Data Encrypted for Impact for Techniques. -
DATA_FROM_CLOUD_STORAGE_OBJECT
Static value Data from Cloud Storage Object for Techniques. -
DATA_FROM_CONFIGURATION_REPOSITORY
Static value Data from Configuration Repository for Techniques. -
DATA_FROM_INFORMATION_REPOSITORIES
Static value Data from Information Repositories for Techniques. -
DATA_FROM_LOCAL_SYSTEM
Static value Data from Local System for Techniques. -
DATA_MANIPULATION
Static value Data Manipulation for Techniques. -
DATA_STAGED
Static value Data Staged for Techniques. -
DEFACEMENT
Static value Defacement for Techniques. -
DEOBFUSCATE_DECODE_FILES_OR_INFORMATION
Static value Deobfuscate/Decode Files or Information for Techniques. -
DISK_WIPE
Static value Disk Wipe for Techniques. -
DOMAIN_TRUST_DISCOVERY
Static value Domain Trust Discovery for Techniques. -
DRIVE_BY_COMPROMISE
Static value Drive-by Compromise for Techniques. -
DYNAMIC_RESOLUTION
Static value Dynamic Resolution for Techniques. -
ENDPOINT_DENIAL_OF_SERVICE
Static value Endpoint Denial of Service for Techniques. -
EVENT_TRIGGERED_EXECUTION
Static value Event Triggered Execution for Techniques. -
EXFILTRATION_OVER_ALTERNATIVE_PROTOCOL
Static value Exfiltration Over Alternative Protocol for Techniques. -
EXPLOIT_PUBLIC_FACING_APPLICATION
Static value Exploit Public-Facing Application for Techniques. -
EXPLOITATION_FOR_CLIENT_EXECUTION
Static value Exploitation for Client Execution for Techniques. -
EXPLOITATION_FOR_CREDENTIAL_ACCESS
Static value Exploitation for Credential Access for Techniques. -
EXPLOITATION_FOR_DEFENSE_EVASION
Static value Exploitation for Defense Evasion for Techniques. -
EXPLOITATION_FOR_PRIVILEGE_ESCALATION
Static value Exploitation for Privilege Escalation for Techniques. -
EXPLOITATION_OF_REMOTE_SERVICES
Static value Exploitation of Remote Services for Techniques. -
EXTERNAL_REMOTE_SERVICES
Static value External Remote Services for Techniques. -
FALLBACK_CHANNELS
Static value Fallback Channels for Techniques. -
FILE_AND_DIRECTORY_DISCOVERY
Static value File and Directory Discovery for Techniques. -
GATHER_VICTIM_NETWORK_INFORMATION
Static value Gather Victim Network Information for Techniques. -
HIDE_ARTIFACTS
Static value Hide Artifacts for Techniques. -
HIJACK_EXECUTION_FLOW
Static value Hijack Execution Flow for Techniques. -
IMPAIR_DEFENSES
Static value Impair Defenses for Techniques. -
IMPLANT_CONTAINER_IMAGE
Static value Implant Container Image for Techniques. -
INDICATOR_REMOVAL_ON_HOST
Static value Indicator Removal on Host for Techniques. -
INDIRECT_COMMAND_EXECUTION
Static value Indirect Command Execution for Techniques. -
INGRESS_TOOL_TRANSFER
Static value Ingress Tool Transfer for Techniques. -
INPUT_CAPTURE
Static value Input Capture for Techniques. -
INTER_PROCESS_COMMUNICATION
Static value Inter-Process Communication for Techniques. -
LATERAL_TOOL_TRANSFER
Static value Lateral Tool Transfer for Techniques. -
MAN_IN_THE_MIDDLE
Static value Man-in-the-Middle for Techniques. -
MASQUERADING
Static value Masquerading for Techniques. -
MODIFY_AUTHENTICATION_PROCESS
Static value Modify Authentication Process for Techniques. -
MODIFY_REGISTRY
Static value Modify Registry for Techniques. -
NETWORK_DENIAL_OF_SERVICE
Static value Network Denial of Service for Techniques. -
NETWORK_SERVICE_SCANNING
Static value Network Service Scanning for Techniques. -
NETWORK_SNIFFING
Static value Network Sniffing for Techniques. -
NON_APPLICATION_LAYER_PROTOCOL
Static value Non-Application Layer Protocol for Techniques. -
NON_STANDARD_PORT
Static value Non-Standard Port for Techniques. -
OBTAIN_CAPABILITIES
Static value Obtain Capabilities for Techniques. -
OBFUSCATED_FILES_OR_INFORMATION
Static value Obfuscated Files or Information for Techniques. -
OFFICE_APPLICATION_STARTUP
Static value Office Application Startup for Techniques. -
OS_CREDENTIAL_DUMPING
Static value OS Credential Dumping for Techniques. -
PERMISSION_GROUPS_DISCOVERY
Static value Permission Groups Discovery for Techniques. -
PHISHING
Static value Phishing for Techniques. -
PRE_OS_BOOT
Static value Pre-OS Boot for Techniques. -
PROCESS_DISCOVERY
Static value Process Discovery for Techniques. -
PROCESS_INJECTION
Static value Process Injection for Techniques. -
PROTOCOL_TUNNELING
Static value Protocol Tunneling for Techniques. -
PROXY
Static value Proxy for Techniques. -
QUERY_REGISTRY
Static value Query Registry for Techniques. -
REMOTE_ACCESS_SOFTWARE
Static value Remote Access Software for Techniques. -
REMOTE_SERVICE_SESSION_HIJACKING
Static value Remote Service Session Hijacking for Techniques. -
REMOTE_SERVICES
Static value Remote Services for Techniques. -
REMOTE_SYSTEM_DISCOVERY
Static value Remote System Discovery for Techniques. -
RESOURCE_HIJACKING
Static value Resource Hijacking for Techniques. -
SCHEDULED_TASK_JOB
Static value Scheduled Task/Job for Techniques. -
SCREEN_CAPTURE
Static value Screen Capture for Techniques. -
SEARCH_VICTIM_OWNED_WEBSITES
Static value Search Victim-Owned Websites for Techniques. -
SERVER_SOFTWARE_COMPONENT
Static value Server Software Component for Techniques. -
SERVICE_STOP
Static value Service Stop for Techniques. -
SIGNED_BINARY_PROXY_EXECUTION
Static value Signed Binary Proxy Execution for Techniques. -
SOFTWARE_DEPLOYMENT_TOOLS
Static value Software Deployment Tools for Techniques. -
SQL_STORED_PROCEDURES
Static value SQL Stored Procedures for Techniques. -
STEAL_OR_FORGE_KERBEROS_TICKETS
Static value Steal or Forge Kerberos Tickets for Techniques. -
SUBVERT_TRUST_CONTROLS
Static value Subvert Trust Controls for Techniques. -
SUPPLY_CHAIN_COMPROMISE
Static value Supply Chain Compromise for Techniques. -
SYSTEM_INFORMATION_DISCOVERY
Static value System Information Discovery for Techniques. -
TAINT_SHARED_CONTENT
Static value Taint Shared Content for Techniques. -
TRAFFIC_SIGNALING
Static value Traffic Signaling for Techniques. -
TRANSFER_DATA_TO_CLOUD_ACCOUNT
Static value Transfer Data to Cloud Account for Techniques. -
TRUSTED_RELATIONSHIP
Static value Trusted Relationship for Techniques. -
UNSECURED_CREDENTIALS
Static value Unsecured Credentials for Techniques. -
USER_EXECUTION
Static value User Execution for Techniques. -
VALID_ACCOUNTS
Static value Valid Accounts for Techniques. -
WINDOWS_MANAGEMENT_INSTRUMENTATION
Static value Windows Management Instrumentation for Techniques. -
FILE_AND_DIRECTORY_PERMISSIONS_MODIFICATION
Static value File and Directory Permissions Modification for Techniques.
-
-
Constructor Details
-
Techniques
public Techniques()
-
-
Method Details
-
fromString
Creates or finds a Techniques from its string representation.- Parameters:
name
- a name to look for.- Returns:
- the corresponding Techniques.
-
values
Gets known Techniques values.- Returns:
- known Techniques values.
-