Hijack Execution Flow
Adversaries may execute their own malicious payloads by hijacking the way operating systems run programs.
Description
Adversaries may execute their own malicious payloads by hijacking the way operating systems run programs.
Available Mitigations
This technique can be mitigated using 5 documented security measures.
Privileged Account ManagementRestrict File and Directory PermissionsRestrict Library LoadingRestrict Registry PermissionsEnvironment Variable Permissions
Quick Info
- Technique ID
- T1574
- Tactic
- Persistence
- Sub-Techniques
- 12
- Mitigations
- 5
