Input Injection
Adversaries may simulate keystrokes on a victim's computer by various means to perform any type of action on behalf of the user.
Description
Adversaries may simulate keystrokes on a victim's computer by various means to perform any type of action on behalf of the user.
Available Mitigations
This technique can be mitigated using 1 documented security measures.
Behavior Prevention on Endpoint
Quick Info
- Technique ID
- T1674
- Tactic
- Execution
- Mitigations
- 1
