Robuta

Sponsor of the Day: Jerkmate
https://app-attack-matrix.com/techniques/Deepening%20Control/Disable%20Runtime%20Protection%20Service/subtechniques/Configuration%20Tampering/ Configuration Tampering - Application Security Tactics & Techniques Matrix application security tacticstechniques matrixconfigurationtampering https://app-attack-matrix.com/techniques/Reconnaissance/Application%20Dependencies%20Mapping/Application%20Dependencies%20Mapping/ Application Dependencies Mapping - Application Security Tactics & Techniques Matrix security tactics techniquesapplication dependenciesmappingmatrix https://app-attack-matrix.com/tactics/Gain%20Access/ Index - Application Security Tactics & Techniques Matrix application security tacticstechniques matrixindex https://app-attack-matrix.com/techniques/Resource%20Development/Obtain%20Capabilities/subtechniques/Vulnerabilities/ Vulnerabilities - Application Security Tactics & Techniques Matrix application security tacticstechniques matrixvulnerabilities https://app-attack-matrix.com/techniques/Resource%20Development/Compromised%20Code%20Signing%20and%20Build%20Infrastructure/subtechniques/Build%20Script%20Tampering/ Build Script Tampering - Application Security Tactics & Techniques Matrix application security tacticsbuild scripttechniques matrixtampering https://app-attack-matrix.com/techniques/Gain%20Access/Valid%20Accounts/subtechniques/Default%20Accounts/ Default Accounts - Application Security Tactics & Techniques Matrix application security tacticsdefault accountstechniques matrix https://app-attack-matrix.com/contributors/ Contributors - Application Security Tactics & Techniques Matrix application security tacticstechniques matrixcontributors https://app-attack-matrix.com/techniques/Reconnaissance/Application%20API%20Specification%20Harvesting/Application%20API%20Specification%20Harvesting/ Application API Specification Harvesting - Application Security Tactics & Techniques Matrix security tactics techniquesapplication apispecificationharvestingmatrix https://app-attack-matrix.com/techniques/Expanding%20Control/Cloud%20Service%20Discovery/Cloud%20Service%20Discovery/ Cloud Service Discovery - Application Security Tactics & Techniques Matrix application security tacticscloud servicetechniques matrixdiscovery https://app-attack-matrix.com/techniques/Impact/Data%20Destruction/subtechniques/Lifecycle-Triggered%20Deletion/ Lifecycle-Triggered Deletion - Application Security Tactics & Techniques Matrix application security tacticstechniques matrixlifecycletriggereddeletion https://app-attack-matrix.com/techniques/Payload%20Execution/Execution%20Using%20Standard%20Applicative%20Flow/Execution%20Using%20Standard%20Applicative%20Flow/ Execution Using Standard Applicative Flow - Application Security Tactics & Techniques Matrix application security tacticsexecution usingtechniques matrixstandardapplicative https://app-attack-matrix.com/techniques/Payload%20Execution/Request%20Forgery/subtechniques/JNDI%20Injection/ JNDI Injection - Application Security Tactics & Techniques Matrix application security tacticstechniques matrixjndiinjection https://app-attack-matrix.com/techniques/Deepening%20Control/Exploitation%20for%20Privilege%20Escalation/Exploitation%20for%20Privilege%20Escalation/ Exploitation for Privilege Escalation - Application Security Tactics & Techniques Matrix application security tacticsprivilege escalationtechniques matrixexploitation https://app-attack-matrix.com/techniques/Payload%20Execution/Remote%20Code%20Execution%20Exploitation/Remote%20Code%20Execution%20Exploitation/ Remote Code Execution Exploitation - Application Security Tactics & Techniques Matrix remote code executionapplication security tacticstechniques matrixexploitation https://app-attack-matrix.com/techniques/Gain%20Access/External%20Remote%20Services/subtechniques/Exposed%20Gateway/ Exposed Gateway - Application Security Tactics & Techniques Matrix application security tacticstechniques matrixexposedgateway https://app-attack-matrix.com/tactics/Payload%20Execution/ Payload Execution - Application Security Tactics & Techniques Matrix application security tacticstechniques matrixpayloadexecution https://app-attack-matrix.com/attacks/ Attacks - Application Security Tactics & Techniques Matrix application security tacticstechniques matrixattacks https://app-attack-matrix.com/techniques/Impact/Data%20Exfiltration/Data%20Exfiltration/ Data Exfiltration - Application Security Tactics & Techniques Matrix application security tacticsdata exfiltrationtechniques matrix https://app-attack-matrix.com/techniques/Reconnaissance/Public%20Source%20Code%20and%20Artifacts%20Analysis/subtechniques/Public%20Repository%20Discovery/ Public Repository Discovery - Application Security Tactics & Techniques Matrix application security tacticspublic repositorytechniques matrixdiscovery https://app-attack-matrix.com/techniques/Impact/Data%20Manipulation/Data%20Manipulation/ Data Manipulation - Application Security Tactics & Techniques Matrix application security tacticsdata manipulationtechniques matrix https://app-attack-matrix.com/techniques/Expanding%20Control/Cloud%20Service%20Discovery/subtechniques/API-based%20Resource%20Listing/ API based Resource Listing - Application Security Tactics & Techniques Matrix application security tacticsapi basedresource listingtechniques matrix https://app-attack-matrix.com/techniques/Deepening%20Control/Exploitation%20for%20Privilege%20Escalation/subtechniques/Symlink%20Attack/ Symlink Attack - Application Security Tactics & Techniques Matrix application security tacticstechniques matrixsymlinkattack https://app-attack-matrix.com/techniques/Reconnaissance/Application%20Dependencies%20Mapping/subtechniques/Manifest%20Inspection/ Manifest Inspection - Application Security Tactics & Techniques Matrix application security tacticstechniques matrixmanifestinspection https://app-attack-matrix.com/techniques/Impact/Service%20Disruption/subtechniques/Denial%20of%20Service%20%28DoS%29%20Attacks/ Denial of Service (DoS) Attacks - Application Security Tactics & Techniques Matrix application security tacticsservice dostechniques matrixdenialattacks https://app-attack-matrix.com/tactics/Reconnaissance/ Index - Application Security Tactics & Techniques Matrix application security tacticstechniques matrixindex https://app-attack-matrix.com/techniques/Impact/Data%20Destruction/Data%20Destruction/ Data Destruction - Application Security Tactics & Techniques Matrix application security tacticsdata destructiontechniques matrix https://app-attack-matrix.com/techniques/Deepening%20Control/Exploitation%20for%20Defense%20Evasion/Exploitation%20for%20Defense%20Evasion/ Exploitation for Defense Evasion - Application Security Tactics & Techniques Matrix application security tacticsdefense evasiontechniques matrixexploitation https://app-attack-matrix.com/techniques/Impact/Resource%20Hijacking/Resource%20Hijacking/ Resource Hijacking - Application Security Tactics & Techniques Matrix application security tacticstechniques matrixresourcehijacking https://app-attack-matrix.com/techniques/Resource%20Development/Develop%20Capabilities/subtechniques/Malware/ Malware - Application Security Tactics & Techniques Matrix application security tacticstechniques matrixmalware https://app-attack-matrix.com/techniques/Payload%20Execution/Injection%20Exploitations/subtechniques/LDAP%20Injection/ LDAP Injection - Application Security Tactics & Techniques Matrix application security tacticstechniques matrixldapinjection https://app-attack-matrix.com/techniques/Deepening%20Control/C2%20over%20App-Protocols/subtechniques/Web%20Protocols/ Web Protocols - Application Security Tactics & Techniques Matrix application security tacticstechniques matrixwebprotocols