List of all Techniques under Persistence Tactics in MITRE Enterprise ATT&CK Framework

Persistence Tactics in MITRE Enterprise ATT&CK Framework has total of 63 Techniques. Below is listing of all Techniques under Persistence Tactics in MITRE Enterprise ATT&CK Framework:

  1. .bash_profile and .bashrc
  2. Accessibility Features
  3. Account Manipulation
  4. AppCert DLLs
  5. AppInit DLLs
  6. Application Shimming
  7. Authentication Package
  8. BITS Jobs
  9. Bootkit
  10. Browser Extensions
  11. Change Default File Association
  12. Component Firmware
  13. Component Object Model Hijacking
  14. Create Account
  15. DLL Search Order Hijacking
  16. Dylib Hijacking
  17. Emond
  18. External Remote Services
  19. File System Permissions Weakness
  20. Hidden Files and Directories
  21. Hooking
  22. Hypervisor
  23. Image File Execution Options Injection
  24. Implant Container Image
  25. Kernel Modules and Extensions
  26. Launch Agent
  27. Launch Daemon
  28. Launchctl
  29. LC_LOAD_DYLIB Addition
  30. Local Job Scheduling
  31. Login Item
  32. Logon Scripts
  33. LSASS Driver
  34. Modify Existing Service
  35. Netsh Helper DLL
  36. New Service
  37. Office Application Startup
  38. Path Interception
  39. Plist Modification
  40. Port Knocking
  41. Port Monitors
  42. PowerShell Profile
  43. Rc.common
  44. Re-opened Applications
  45. Redundant Access
  46. Registry Run Keys / Startup Folder
  47. Scheduled Task
  48. Screensaver
  49. Security Support Provider
  50. Server Software Component
  51. Service Registry Permissions Weakness
  52. Setuid and Setgid
  53. Shortcut Modification
  54. SIP and Trust Provider Hijacking
  55. Startup Items
  56. System Firmware
  57. Systemd Service
  58. Time Providers
  59. Trap
  60. Valid Accounts
  61. Web Shell
  62. Windows Management Instrumentation Event Subscription
  63. Winlogon Helper DLL

For list of all other Tactics and Techniques in MITRE Enterprise ATT&CK Framework, please go to List of all Tactics in MITRE Enterprise ATT&CK Framework