Critical Infrastructure Cybersecurity Framework
T1647Defense Evasion1 Mitigations

Plist File Modification

Adversaries may modify property list files to enable other malicious activity, while also potentially evading and bypassing system defenses.

Description

Adversaries may modify property list files to enable other malicious activity, while also potentially evading and bypassing system defenses.

Available Mitigations

This technique can be mitigated using 1 documented security measures.

Application Developer Guidance

Quick Info

Technique ID
T1647
Mitigations
1

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.