Currently viewing ATT&CK v7.2 which was live between July 8, 2020 and October 26, 2020. Learn more about the versioning system or see the live site.
Register to stream the next session of ATT&CKcon Power Hour November 12

Research visibility gap of security vendors

If an adversary can identify which security tools a victim is using they may be able to identify ways around those tools. [1]

ID: T1290
Sub-techniques:  No sub-techniques
Tactic: Technical Weakness Identification
Version: 1.0
Created: 14 December 2017
Last Modified: 17 October 2018

Detection

Detectable by Common Defenses (Yes/No/Partial): No

Explanation: Public source external to the defender's organization.

Difficulty for the Adversary

Easy for the Adversary (Yes/No): No

Explanation: Requires in-depth research and potentially other intrusions, requires unbounded amount of work to possibly find a return on investment

References