Vectors
- abuse-acl 1
- abuse-sudo_T1548.003 1
- active-scanning_T1595 6
- arbitrary-file-read 1
- c&c-non_application-layer-protocol_T1095 5
- command-injection 1
- credential-access_T1555 1
- dcsync 1
- default-accounts_T1078.001 1
- directory-traversal 1
- execution-php_T1059_006 1
- execution-powershell_T1059_001 1
- execution-unix_T1059_004 2
- execution-unix-shell_T1059_004 2
- exploit-public-facing-application_T1190 4
- file-discovery_T1083 1
- guest-enabled 1
- hardcoded-creds 1
- ingress-tool-transfer_T1105 1
- net-sniffing_T1040 1
- password-reuse 1
- password-spray 1
- path-injection 1
- pe-cronjob_T1053.003 1
- pe-setuid_T1548.001 3
- pe-sudo_T1548.003 1
- powershell_T1059.001 1
- privilege-escalation_T1068 2
- process-discovery_T1057 2
- public-exploit 3
- public-exploit_T1190 2
- rdp_T1021.001 1
- sebackupprivilege 1
- ssh-proxycommand 1
- subdomain 1
- suid 1
- system-discovery_T1082 2
- targeted-kerberoast 1
- unsecured_credentials_T1552 1
- upload-malware_T1608.001 1
- valid-accounts_T1078 3