Critical Infrastructure Cybersecurity Framework

Server Software Component

Adversaries may abuse legitimate extensible development features of servers to establish persistent access.

Description

Adversaries may abuse legitimate extensible development features of servers to establish persistent access.

Quick Info

Technique ID
T1505
Sub-Techniques
6
Mitigations
0

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.