Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|
New Service | New Service | DCSYNC | System Owner/User Discovery | ||||||||
Kerberoasting | |||||||||||
Mshta |