Files
atomic-red-team/atomics/Indexes/Matrices/esxi-matrix.md
T
2026-04-24 07:25:50 +00:00

17 KiB

ESXi Atomic Tests by ATT&CK Tactic & Technique

initial-access execution persistence privilege-escalation defense-evasion credential-access discovery lateral-movement collection exfiltration command-and-control impact
Exploit Public-Facing Application CONTRIBUTE A TEST Scheduled Task/Job: Cron CONTRIBUTE A TEST Boot or Logon Initialization Scripts CONTRIBUTE A TEST Boot or Logon Initialization Scripts CONTRIBUTE A TEST Masquerading: Match Legitimate Name or Location CONTRIBUTE A TEST Brute Force: Password Guessing CONTRIBUTE A TEST System Network Configuration Discovery: Internet Connection Discovery CONTRIBUTE A TEST Remote Services: SSH CONTRIBUTE A TEST Data Staged: Local Data Staging CONTRIBUTE A TEST Exfiltration Over Web Service CONTRIBUTE A TEST Data Encoding: Standard Encoding CONTRIBUTE A TEST Service Stop CONTRIBUTE A TEST
Valid Accounts: Default Accounts CONTRIBUTE A TEST ESXi Administration Command CONTRIBUTE A TEST Scheduled Task/Job: Cron CONTRIBUTE A TEST Scheduled Task/Job: Cron CONTRIBUTE A TEST Hide Artifacts CONTRIBUTE A TEST Brute Force: Password Spraying CONTRIBUTE A TEST Account Discovery: Local Account CONTRIBUTE A TEST Remote Services CONTRIBUTE A TEST Remote Data Staging CONTRIBUTE A TEST Exfiltration Over Webhook CONTRIBUTE A TEST Dynamic Resolution: Domain Generation Algorithms CONTRIBUTE A TEST Defacement CONTRIBUTE A TEST
Valid Accounts CONTRIBUTE A TEST Scheduled Task/Job CONTRIBUTE A TEST Scheduled Task/Job CONTRIBUTE A TEST Scheduled Task/Job CONTRIBUTE A TEST Indicator Removal on Host: Clear Command History CONTRIBUTE A TEST Brute Force CONTRIBUTE A TEST System Information Discovery CONTRIBUTE A TEST Exploitation of Remote Services CONTRIBUTE A TEST Data from Local System CONTRIBUTE A TEST Exfiltration Over Symmetric Encrypted Non-C2 Protocol CONTRIBUTE A TEST Application Layer Protocol: DNS CONTRIBUTE A TEST Defacement: Internal Defacement CONTRIBUTE A TEST
Domain Accounts CONTRIBUTE A TEST Command and Scripting Interpreter CONTRIBUTE A TEST Valid Accounts: Default Accounts CONTRIBUTE A TEST Escape to Host CONTRIBUTE A TEST Deobfuscate/Decode Files or Information CONTRIBUTE A TEST Brute Force: Credential Stuffing CONTRIBUTE A TEST Virtual Machine Discovery CONTRIBUTE A TEST Lateral Tool Transfer CONTRIBUTE A TEST Data Staged CONTRIBUTE A TEST Exfiltration to Code Repository CONTRIBUTE A TEST Symmetric Cryptography CONTRIBUTE A TEST Account Access Removal CONTRIBUTE A TEST
Valid Accounts: Local Accounts CONTRIBUTE A TEST Command and Scripting Interpreter: Bash CONTRIBUTE A TEST Create Account: Local Account CONTRIBUTE A TEST Valid Accounts: Default Accounts CONTRIBUTE A TEST Impair Defenses CONTRIBUTE A TEST System Network Configuration Discovery CONTRIBUTE A TEST Exfiltration Over Alternative Protocol - Exfiltration Over Asymmetric Encrypted Non-C2 Protocol CONTRIBUTE A TEST Fast Flux DNS CONTRIBUTE A TEST Data Encrypted for Impact CONTRIBUTE A TEST
Command and Scripting Interpreter: Python CONTRIBUTE A TEST SSH Authorized Keys CONTRIBUTE A TEST SSH Authorized Keys CONTRIBUTE A TEST Masquerading CONTRIBUTE A TEST Account Discovery CONTRIBUTE A TEST Exfiltration Over C2 Channel CONTRIBUTE A TEST Application Layer Protocol CONTRIBUTE A TEST Data Destruction CONTRIBUTE A TEST
Hypervisor CLI CONTRIBUTE A TEST Compromise Host Software Binary CONTRIBUTE A TEST Account Manipulation CONTRIBUTE A TEST Indicator Removal on Host: Timestomp CONTRIBUTE A TEST File and Directory Discovery CONTRIBUTE A TEST Exfiltration Over Alternative Protocol CONTRIBUTE A TEST Protocol Tunneling CONTRIBUTE A TEST Inhibit System Recovery CONTRIBUTE A TEST
Account Manipulation CONTRIBUTE A TEST Valid Accounts CONTRIBUTE A TEST Impair Defenses: Disable or Modify System Firewall CONTRIBUTE A TEST System Network Connections Discovery CONTRIBUTE A TEST Exfiltration Over Web Service: Exfiltration to Text Storage Sites CONTRIBUTE A TEST External Proxy CONTRIBUTE A TEST System Shutdown/Reboot CONTRIBUTE A TEST
Valid Accounts CONTRIBUTE A TEST Domain Accounts CONTRIBUTE A TEST Valid Accounts: Default Accounts CONTRIBUTE A TEST Log Enumeration CONTRIBUTE A TEST Exfiltration Over Web Service: Exfiltration to Cloud Storage CONTRIBUTE A TEST Proxy CONTRIBUTE A TEST
Domain Accounts CONTRIBUTE A TEST Boot or Logon Initialization Scripts: Rc.common CONTRIBUTE A TEST File and Directory Permissions Modification CONTRIBUTE A TEST Process Discovery CONTRIBUTE A TEST Data Transfer Size Limits CONTRIBUTE A TEST Dynamic Resolution CONTRIBUTE A TEST
Server Software Component CONTRIBUTE A TEST Valid Accounts: Local Accounts CONTRIBUTE A TEST Impair Defenses: Indicator Blocking CONTRIBUTE A TEST Remote System Discovery CONTRIBUTE A TEST Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol CONTRIBUTE A TEST Web Service CONTRIBUTE A TEST
Boot or Logon Initialization Scripts: Rc.common CONTRIBUTE A TEST Indicator Removal on Host CONTRIBUTE A TEST Software Discovery CONTRIBUTE A TEST DNS Calculation CONTRIBUTE A TEST
Create Account CONTRIBUTE A TEST Execution Guardrails CONTRIBUTE A TEST Local Storage Discovery CONTRIBUTE A TEST Multi-Stage Channels CONTRIBUTE A TEST
vSphere Installation Bundles CONTRIBUTE A TEST Impair Defenses: Impair Command History Logging CONTRIBUTE A TEST System Time Discovery CONTRIBUTE A TEST File Transfer Protocols CONTRIBUTE A TEST
Valid Accounts: Local Accounts CONTRIBUTE A TEST Valid Accounts CONTRIBUTE A TEST One-Way Communication CONTRIBUTE A TEST
Obfuscated Files or Information CONTRIBUTE A TEST Proxy: Multi-hop Proxy CONTRIBUTE A TEST
Run Virtual Instance CONTRIBUTE A TEST Data Obfuscation CONTRIBUTE A TEST
Domain Accounts CONTRIBUTE A TEST Non-Standard Port CONTRIBUTE A TEST
Clear Persistence CONTRIBUTE A TEST Encrypted Channel CONTRIBUTE A TEST
Indicator Removal on Host: File Deletion CONTRIBUTE A TEST Bidirectional Communication CONTRIBUTE A TEST
Valid Accounts: Local Accounts CONTRIBUTE A TEST Asymmetric Cryptography CONTRIBUTE A TEST
Non-Application Layer Protocol CONTRIBUTE A TEST
Protocol or Service Impersonation CONTRIBUTE A TEST
Domain Fronting CONTRIBUTE A TEST
Data Encoding CONTRIBUTE A TEST
Non-Standard Encoding CONTRIBUTE A TEST
Application Layer Protocol: Web Protocols CONTRIBUTE A TEST
Ingress Tool Transfer CONTRIBUTE A TEST
Hide Infrastructure CONTRIBUTE A TEST
Data Obfuscation via Steganography CONTRIBUTE A TEST
Fallback Channels CONTRIBUTE A TEST
Proxy: Internal Proxy CONTRIBUTE A TEST
Dead Drop Resolver CONTRIBUTE A TEST
Junk Data CONTRIBUTE A TEST