Technique enum.
Fields | 
      |
|---|---|
| Name | Description | 
ABUSE_ELEVATION_CONTROL_MECHANISM | 
        |
ACCESS_TOKEN_MANIPULATION | 
        |
ACCOUNT_MANIPULATION | 
        |
ACTIVE_SCANNING | 
        |
CLOUD_ACCOUNTS | 
        |
CLOUD_GROUPS | 
        |
COMMAND_AND_SCRIPTING_INTERPRETER | 
        |
CREATE_OR_MODIFY_SYSTEM_PROCESS | 
        |
DATA_DESTRUCTION | 
        |
DEFAULT_ACCOUNTS | 
        |
DOMAIN_POLICY_MODIFICATION | 
        |
DYNAMIC_RESOLUTION | 
        |
EXFILTRATION_OVER_WEB_SERVICE | 
        |
EXFILTRATION_TO_CLOUD_STORAGE | 
        |
EXPLOIT_PUBLIC_FACING_APPLICATION | 
        |
EXTERNAL_PROXY | 
        |
IMPAIR_DEFENSES | 
        |
INGRESS_TOOL_TRANSFER | 
        |
LOCAL_ACCOUNTS | 
        |
MODIFY_AUTHENTICATION_PROCESS | 
        |
MODIFY_CLOUD_COMPUTE_INFRASTRUCTURE | 
        |
MULTI_HOP_PROXY | 
        |
NATIVE_API | 
        |
NETWORK_DENIAL_OF_SERVICE | 
        |
NETWORK_SERVICE_DISCOVERY | 
        |
PERMISSION_GROUPS_DISCOVERY | 
        |
PROXY | 
        |
RESOURCE_HIJACKING | 
        |
SCANNING_IP_BLOCKS | 
        |
SHARED_MODULES | 
        |
SSH_AUTHORIZED_KEYS | 
        |
STEAL_WEB_SESSION_COOKIE | 
        |
TECHNIQUE_UNSPECIFIED | 
        |
UNIX_SHELL | 
        |
UNSECURED_CREDENTIALS | 
        |
VALID_ACCOUNTS | 
        |