Modify Registry
Adversaries may interact with the Windows Registry to hide configuration information within Registry keys, remove information as part of cleaning up, or as part of other techniques.
Description
Adversaries may interact with the Windows Registry to hide configuration information within Registry keys, remove information as part of cleaning up, or as part of other techniques.
Available Mitigations
This technique can be mitigated using 1 documented security measures.
Restrict Registry Permissions
Quick Info
- Technique ID
- T1112
- Tactic
- Defense Evasion
- Mitigations
- 1
