Exploit Public-Facing Application
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Description
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Available Mitigations
This technique can be mitigated using 2 documented security measures.
Update SoftwareVulnerability Scanning
Quick Info
- Technique ID
- T1190
- Tactic
- Initial Access
- Mitigations
- 2
