Contact
DMCA
Privacy
Robuta
Sponsor of the Day:
Jerkmate
https://app-attack-matrix.com/techniques/Deepening%20Control/Disable%20Runtime%20Protection%20Service/subtechniques/Configuration%20Tampering/
Configuration Tampering - Application Security Tactics & Techniques Matrix
application security tactics
techniques matrix
configuration
tampering
https://app-attack-matrix.com/techniques/Reconnaissance/Application%20Dependencies%20Mapping/Application%20Dependencies%20Mapping/
Application Dependencies Mapping - Application Security Tactics & Techniques Matrix
security tactics techniques
application dependencies
mapping
matrix
https://app-attack-matrix.com/tactics/Gain%20Access/
Index - Application Security Tactics & Techniques Matrix
application security tactics
techniques matrix
index
https://app-attack-matrix.com/techniques/Resource%20Development/Obtain%20Capabilities/subtechniques/Vulnerabilities/
Vulnerabilities - Application Security Tactics & Techniques Matrix
application security tactics
techniques matrix
vulnerabilities
https://app-attack-matrix.com/techniques/Resource%20Development/Compromised%20Code%20Signing%20and%20Build%20Infrastructure/subtechniques/Build%20Script%20Tampering/
Build Script Tampering - Application Security Tactics & Techniques Matrix
application security tactics
build script
techniques matrix
tampering
https://app-attack-matrix.com/techniques/Gain%20Access/Valid%20Accounts/subtechniques/Default%20Accounts/
Default Accounts - Application Security Tactics & Techniques Matrix
application security tactics
default accounts
techniques matrix
https://app-attack-matrix.com/contributors/
Contributors - Application Security Tactics & Techniques Matrix
application security tactics
techniques matrix
contributors
https://app-attack-matrix.com/techniques/Reconnaissance/Application%20API%20Specification%20Harvesting/Application%20API%20Specification%20Harvesting/
Application API Specification Harvesting - Application Security Tactics & Techniques Matrix
security tactics techniques
application api
specification
harvesting
matrix
https://app-attack-matrix.com/techniques/Expanding%20Control/Cloud%20Service%20Discovery/Cloud%20Service%20Discovery/
Cloud Service Discovery - Application Security Tactics & Techniques Matrix
application security tactics
cloud service
techniques matrix
discovery
https://app-attack-matrix.com/techniques/Impact/Data%20Destruction/subtechniques/Lifecycle-Triggered%20Deletion/
Lifecycle-Triggered Deletion - Application Security Tactics & Techniques Matrix
application security tactics
techniques matrix
lifecycle
triggered
deletion
https://app-attack-matrix.com/techniques/Payload%20Execution/Execution%20Using%20Standard%20Applicative%20Flow/Execution%20Using%20Standard%20Applicative%20Flow/
Execution Using Standard Applicative Flow - Application Security Tactics & Techniques Matrix
application security tactics
execution using
techniques matrix
standard
applicative
https://app-attack-matrix.com/techniques/Payload%20Execution/Request%20Forgery/subtechniques/JNDI%20Injection/
JNDI Injection - Application Security Tactics & Techniques Matrix
application security tactics
techniques matrix
jndi
injection
https://app-attack-matrix.com/techniques/Deepening%20Control/Exploitation%20for%20Privilege%20Escalation/Exploitation%20for%20Privilege%20Escalation/
Exploitation for Privilege Escalation - Application Security Tactics & Techniques Matrix
application security tactics
privilege escalation
techniques matrix
exploitation
https://app-attack-matrix.com/techniques/Payload%20Execution/Remote%20Code%20Execution%20Exploitation/Remote%20Code%20Execution%20Exploitation/
Remote Code Execution Exploitation - Application Security Tactics & Techniques Matrix
remote code execution
application security tactics
techniques matrix
exploitation
https://app-attack-matrix.com/techniques/Gain%20Access/External%20Remote%20Services/subtechniques/Exposed%20Gateway/
Exposed Gateway - Application Security Tactics & Techniques Matrix
application security tactics
techniques matrix
exposed
gateway
https://app-attack-matrix.com/tactics/Payload%20Execution/
Payload Execution - Application Security Tactics & Techniques Matrix
application security tactics
techniques matrix
payload
execution
https://app-attack-matrix.com/attacks/
Attacks - Application Security Tactics & Techniques Matrix
application security tactics
techniques matrix
attacks
https://app-attack-matrix.com/techniques/Impact/Data%20Exfiltration/Data%20Exfiltration/
Data Exfiltration - Application Security Tactics & Techniques Matrix
application security tactics
data exfiltration
techniques matrix
https://app-attack-matrix.com/techniques/Reconnaissance/Public%20Source%20Code%20and%20Artifacts%20Analysis/subtechniques/Public%20Repository%20Discovery/
Public Repository Discovery - Application Security Tactics & Techniques Matrix
application security tactics
public repository
techniques matrix
discovery
https://app-attack-matrix.com/techniques/Impact/Data%20Manipulation/Data%20Manipulation/
Data Manipulation - Application Security Tactics & Techniques Matrix
application security tactics
data manipulation
techniques matrix
https://app-attack-matrix.com/techniques/Expanding%20Control/Cloud%20Service%20Discovery/subtechniques/API-based%20Resource%20Listing/
API based Resource Listing - Application Security Tactics & Techniques Matrix
application security tactics
api based
resource listing
techniques matrix
https://app-attack-matrix.com/techniques/Deepening%20Control/Exploitation%20for%20Privilege%20Escalation/subtechniques/Symlink%20Attack/
Symlink Attack - Application Security Tactics & Techniques Matrix
application security tactics
techniques matrix
symlink
attack
https://app-attack-matrix.com/techniques/Reconnaissance/Application%20Dependencies%20Mapping/subtechniques/Manifest%20Inspection/
Manifest Inspection - Application Security Tactics & Techniques Matrix
application security tactics
techniques matrix
manifest
inspection
https://app-attack-matrix.com/techniques/Impact/Service%20Disruption/subtechniques/Denial%20of%20Service%20%28DoS%29%20Attacks/
Denial of Service (DoS) Attacks - Application Security Tactics & Techniques Matrix
application security tactics
service dos
techniques matrix
denial
attacks
https://app-attack-matrix.com/tactics/Reconnaissance/
Index - Application Security Tactics & Techniques Matrix
application security tactics
techniques matrix
index
https://app-attack-matrix.com/techniques/Impact/Data%20Destruction/Data%20Destruction/
Data Destruction - Application Security Tactics & Techniques Matrix
application security tactics
data destruction
techniques matrix
https://app-attack-matrix.com/techniques/Deepening%20Control/Exploitation%20for%20Defense%20Evasion/Exploitation%20for%20Defense%20Evasion/
Exploitation for Defense Evasion - Application Security Tactics & Techniques Matrix
application security tactics
defense evasion
techniques matrix
exploitation
https://app-attack-matrix.com/techniques/Impact/Resource%20Hijacking/Resource%20Hijacking/
Resource Hijacking - Application Security Tactics & Techniques Matrix
application security tactics
techniques matrix
resource
hijacking
https://app-attack-matrix.com/techniques/Resource%20Development/Develop%20Capabilities/subtechniques/Malware/
Malware - Application Security Tactics & Techniques Matrix
application security tactics
techniques matrix
malware
https://app-attack-matrix.com/techniques/Payload%20Execution/Injection%20Exploitations/subtechniques/LDAP%20Injection/
LDAP Injection - Application Security Tactics & Techniques Matrix
application security tactics
techniques matrix
ldap
injection
https://app-attack-matrix.com/techniques/Deepening%20Control/C2%20over%20App-Protocols/subtechniques/Web%20Protocols/
Web Protocols - Application Security Tactics & Techniques Matrix
application security tactics
techniques matrix
web
protocols