Plist File Modification
Adversaries may modify property list files to enable other malicious activity, while also potentially evading and bypassing system defenses.
Description
Adversaries may modify property list files to enable other malicious activity, while also potentially evading and bypassing system defenses.
Available Mitigations
This technique can be mitigated using 1 documented security measures.
Application Developer Guidance
Quick Info
- Technique ID
- T1647
- Tactic
- Defense Evasion
- Mitigations
- 1
