List of all Techniques under Defense Evasion Tactics in MITRE Enterprise ATT&CK Framework

Defense Evasion Tactics in MITRE Enterprise ATT&CK Framework has total of 73 Techniques. Below is listing of all Techniques under Defense Evasion Tactics in MITRE Enterprise:

  1. Access Token Manipulation
  2. Application Access Token
  3. Binary Padding
  4. BITS Jobs
  5. Bypass User Account Control
  6. Clear Command History
  7. CMSTP
  8. Code Signing
  9. Compile After Delivery
  10. Compiled HTML File
  11. Component Firmware
  12. Component Object Model Hijacking
  13. Connection Proxy
  14. Control Panel Items
  15. DCShadow
  16. Deobfuscate/Decode Files or Information
  17. Disabling Security Tools
  18. DLL Search Order Hijacking
  19. DLL Side-Loading
  20. Execution Guardrails
  21. Exploitation for Defense Evasion
  22. Extra Window Memory Injection
  23. File and Directory Permissions Modification
  24. File Deletion
  25. File System Logical Offsets
  26. Gatekeeper Bypass
  27. Group Policy Modification
  28. Hidden Files and Directories
  29. Hidden Users
  30. Hidden Window
  31. HISTCONTROL
  32. Image File Execution Options Injection
  33. Indicator Blocking
  34. Indicator Removal from Tools
  35. Indicator Removal on Host
  36. Indirect Command Execution
  37. Install Root Certificate
  38. InstallUtil
  39. Launchctl
  40. LC_MAIN Hijacking
  41. Masquerading
  42. Modify Registry
  43. Mshta
  44. Network Share Connection Removal
  45. NTFS File Attributes
  46. Obfuscated Files or Information
  47. Parent PID Spoofing
  48. Plist Modification
  49. Port Knocking
  50. Process Doppelgänging
  51. Process Hollowing
  52. Process Injection
  53. Redundant Access
  54. Regsvcs/Regasm
  55. Regsvr32
  56. Revert Cloud Instance
  57. Rootkit
  58. Rundll32
  59. Scripting
  60. Signed Binary Proxy Execution
  61. Signed Script Proxy Execution
  62. SIP and Trust Provider Hijacking
  63. Software Packing
  64. Space after Filename
  65. Template Injection
  66. Timestomp
  67. Trusted Developer Utilities
  68. Unused/Unsupported Cloud Regions
  69. Valid Accounts
  70. Virtualization/Sandbox Evasion
  71. Web Service
  72. Web Session Cookie
  73. XSL Script Processing

For list of all other Tactics and Techniques in MITRE Enterprise ATT&CK Framework, please go to List of all Tactics in MITRE Enterprise ATT&CK Framework