Files
2026-05-01 23:10:14 -04:00

17 KiB

ESXi Atomic Tests by ATT&CK Tactic & Technique

reconnaissance resource-development initial-access execution persistence privilege-escalation stealth defense-impairment credential-access discovery lateral-movement collection command-and-control exfiltration impact
Exploit Public-Facing Application CONTRIBUTE A TEST Scheduled Task/Job: Cron CONTRIBUTE A TEST Boot or Logon Initialization Scripts CONTRIBUTE A TEST Boot or Logon Initialization Scripts CONTRIBUTE A TEST Masquerading: Match Legitimate Name or Location CONTRIBUTE A TEST File and Directory Permissions Modification CONTRIBUTE A TEST Brute Force: Password Guessing CONTRIBUTE A TEST System Network Configuration Discovery: Internet Connection Discovery CONTRIBUTE A TEST Remote Services: SSH CONTRIBUTE A TEST Data Staged: Local Data Staging CONTRIBUTE A TEST Data Encoding: Standard Encoding CONTRIBUTE A TEST Exfiltration Over Web Service CONTRIBUTE A TEST Service Stop CONTRIBUTE A TEST
Valid Accounts: Default Accounts CONTRIBUTE A TEST ESXi Administration Command CONTRIBUTE A TEST Scheduled Task/Job: Cron CONTRIBUTE A TEST Scheduled Task/Job: Cron CONTRIBUTE A TEST Hide Artifacts CONTRIBUTE A TEST Prevent Command History Logging CONTRIBUTE A TEST Brute Force: Password Spraying CONTRIBUTE A TEST Account Discovery: Local Account CONTRIBUTE A TEST Remote Services CONTRIBUTE A TEST Remote Data Staging CONTRIBUTE A TEST Dynamic Resolution: Domain Generation Algorithms CONTRIBUTE A TEST Exfiltration Over Webhook CONTRIBUTE A TEST Defacement CONTRIBUTE A TEST
Valid Accounts CONTRIBUTE A TEST Scheduled Task/Job CONTRIBUTE A TEST Scheduled Task/Job CONTRIBUTE A TEST Scheduled Task/Job CONTRIBUTE A TEST Indicator Removal on Host: Clear Command History CONTRIBUTE A TEST Disable or Modify Tools CONTRIBUTE A TEST Brute Force CONTRIBUTE A TEST System Information Discovery CONTRIBUTE A TEST Exploitation of Remote Services CONTRIBUTE A TEST Data from Local System CONTRIBUTE A TEST Application Layer Protocol: DNS CONTRIBUTE A TEST Exfiltration Over Symmetric Encrypted Non-C2 Protocol CONTRIBUTE A TEST Defacement: Internal Defacement CONTRIBUTE A TEST
Domain Accounts CONTRIBUTE A TEST Command and Scripting Interpreter CONTRIBUTE A TEST Valid Accounts: Default Accounts CONTRIBUTE A TEST Escape to Host CONTRIBUTE A TEST Deobfuscate/Decode Files or Information CONTRIBUTE A TEST Disable or Modify System Firewall CONTRIBUTE A TEST Brute Force: Credential Stuffing CONTRIBUTE A TEST Virtual Machine Discovery CONTRIBUTE A TEST Lateral Tool Transfer CONTRIBUTE A TEST Data Staged CONTRIBUTE A TEST Symmetric Cryptography CONTRIBUTE A TEST Exfiltration to Code Repository CONTRIBUTE A TEST Account Access Removal CONTRIBUTE A TEST
Valid Accounts: Local Accounts CONTRIBUTE A TEST Command and Scripting Interpreter: Bash CONTRIBUTE A TEST Create Account: Local Account CONTRIBUTE A TEST Valid Accounts: Default Accounts CONTRIBUTE A TEST Masquerading CONTRIBUTE A TEST System Network Configuration Discovery CONTRIBUTE A TEST Fast Flux DNS CONTRIBUTE A TEST Exfiltration Over Alternative Protocol - Exfiltration Over Asymmetric Encrypted Non-C2 Protocol CONTRIBUTE A TEST Data Encrypted for Impact CONTRIBUTE A TEST
Command and Scripting Interpreter: Python CONTRIBUTE A TEST SSH Authorized Keys CONTRIBUTE A TEST SSH Authorized Keys CONTRIBUTE A TEST Indicator Removal on Host: Timestomp CONTRIBUTE A TEST Account Discovery CONTRIBUTE A TEST Application Layer Protocol CONTRIBUTE A TEST Exfiltration Over C2 Channel CONTRIBUTE A TEST Data Destruction CONTRIBUTE A TEST
Hypervisor CLI CONTRIBUTE A TEST Compromise Host Software Binary CONTRIBUTE A TEST Account Manipulation CONTRIBUTE A TEST Valid Accounts: Default Accounts CONTRIBUTE A TEST File and Directory Discovery CONTRIBUTE A TEST Protocol Tunneling CONTRIBUTE A TEST Exfiltration Over Alternative Protocol CONTRIBUTE A TEST Inhibit System Recovery CONTRIBUTE A TEST
Account Manipulation CONTRIBUTE A TEST Valid Accounts CONTRIBUTE A TEST Indicator Removal on Host CONTRIBUTE A TEST System Network Connections Discovery CONTRIBUTE A TEST External Proxy CONTRIBUTE A TEST Exfiltration Over Web Service: Exfiltration to Text Storage Sites CONTRIBUTE A TEST System Shutdown/Reboot CONTRIBUTE A TEST
Valid Accounts CONTRIBUTE A TEST Domain Accounts CONTRIBUTE A TEST Execution Guardrails CONTRIBUTE A TEST Log Enumeration CONTRIBUTE A TEST Proxy CONTRIBUTE A TEST Exfiltration Over Web Service: Exfiltration to Cloud Storage CONTRIBUTE A TEST
Domain Accounts CONTRIBUTE A TEST Boot or Logon Initialization Scripts: Rc.common CONTRIBUTE A TEST Valid Accounts CONTRIBUTE A TEST Process Discovery CONTRIBUTE A TEST Dynamic Resolution CONTRIBUTE A TEST Data Transfer Size Limits CONTRIBUTE A TEST
Server Software Component CONTRIBUTE A TEST Valid Accounts: Local Accounts CONTRIBUTE A TEST Obfuscated Files or Information CONTRIBUTE A TEST Remote System Discovery CONTRIBUTE A TEST Web Service CONTRIBUTE A TEST Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol CONTRIBUTE A TEST
Boot or Logon Initialization Scripts: Rc.common CONTRIBUTE A TEST Run Virtual Instance CONTRIBUTE A TEST Software Discovery CONTRIBUTE A TEST DNS Calculation CONTRIBUTE A TEST
Create Account CONTRIBUTE A TEST Domain Accounts CONTRIBUTE A TEST Local Storage Discovery CONTRIBUTE A TEST Multi-Stage Channels CONTRIBUTE A TEST
vSphere Installation Bundles CONTRIBUTE A TEST Clear Persistence CONTRIBUTE A TEST System Time Discovery CONTRIBUTE A TEST File Transfer Protocols CONTRIBUTE A TEST
Valid Accounts: Local Accounts CONTRIBUTE A TEST Indicator Removal on Host: File Deletion CONTRIBUTE A TEST One-Way Communication CONTRIBUTE A TEST
Valid Accounts: Local Accounts CONTRIBUTE A TEST Proxy: Multi-hop Proxy CONTRIBUTE A TEST
Data Obfuscation CONTRIBUTE A TEST
Non-Standard Port CONTRIBUTE A TEST
Encrypted Channel CONTRIBUTE A TEST
Bidirectional Communication CONTRIBUTE A TEST
Asymmetric Cryptography CONTRIBUTE A TEST
Non-Application Layer Protocol CONTRIBUTE A TEST
Protocol or Service Impersonation CONTRIBUTE A TEST
Domain Fronting CONTRIBUTE A TEST
Data Encoding CONTRIBUTE A TEST
Non-Standard Encoding CONTRIBUTE A TEST
Application Layer Protocol: Web Protocols CONTRIBUTE A TEST
Ingress Tool Transfer CONTRIBUTE A TEST
Hide Infrastructure CONTRIBUTE A TEST
Data Obfuscation via Steganography CONTRIBUTE A TEST
Fallback Channels CONTRIBUTE A TEST
Proxy: Internal Proxy CONTRIBUTE A TEST
Dead Drop Resolver CONTRIBUTE A TEST
Junk Data CONTRIBUTE A TEST