TECHNIQUES
- Home
- Techniques
- PRE-ATT&CK
- Research visibility gap of security vendors
Research visibility gap of security vendors
If an adversary can identify which security tools a victim is using they may be able to identify ways around those tools. [1]
ID: T1290
Sub-techniques:
No sub-techniques
Tactic:
Technical Weakness Identification
Version: 1.0
Created: 14 December 2017
Last Modified: 17 October 2018
Detection
Detectable by Common Defenses (Yes/No/Partial): No
Explanation: Public source external to the defender's organization.
Difficulty for the Adversary
Easy for the Adversary (Yes/No): No
Explanation: Requires in-depth research and potentially other intrusions, requires unbounded amount of work to possibly find a return on investment
References
×