{"id":190,"date":"2022-03-17T12:05:23","date_gmt":"2022-03-17T12:05:23","guid":{"rendered":"https:\/\/fortgale.com\/threats\/?page_id=190"},"modified":"2024-01-03T11:04:24","modified_gmt":"2024-01-03T11:04:24","slug":"home","status":"publish","type":"page","link":"https:\/\/fortgale.com\/threats\/","title":{"rendered":"Home"},"content":{"rendered":"<div data-colibri-id=\"190-c1\" class=\"style-323 style-local-190-c1 position-relative\">\n  \n  <div data-colibri-component=\"section\" data-colibri-id=\"190-c2\" id=\"pre-attacco\" class=\"h-section h-section-global-spacing d-flex align-items-lg-center align-items-md-center align-items-center style-1540 style-local-190-c2 position-relative\">\n    \n    \n    <div class=\"h-section-grid-container h-section-boxed-container\">\n      <div data-colibri-id=\"190-c34\" class=\"h-row-container gutters-row-lg-2 gutters-row-md-2 gutters-row-0 gutters-row-v-lg-2 gutters-row-v-md-2 gutters-row-v-2 style-1544 style-local-190-c34 position-relative\">\n        \n        <div class=\"h-row justify-content-lg-center justify-content-md-center justify-content-center align-items-lg-stretch align-items-md-stretch align-items-stretch gutters-col-lg-2 gutters-col-md-2 gutters-col-0 gutters-col-v-lg-2 gutters-col-v-md-2 gutters-col-v-2\">\n          \n          <div class=\"h-column h-column-container d-flex h-col-lg-12 h-col-md-12 h-col-12 style-1545-outer style-local-190-c35-outer\">\n            <div data-colibri-id=\"190-c35\" class=\"d-flex h-flex-basis h-column__inner h-px-lg-2 h-px-md-2 h-px-2 v-inner-lg-2 v-inner-md-2 v-inner-2 style-1545 style-local-190-c35 position-relative\">\n              \n              \n              <div class=\"w-100 h-y-container h-column__content h-column__v-align flex-basis-100 align-self-lg-start align-self-md-start align-self-start\">\n                \n                <div data-colibri-id=\"190-c36\" class=\"h-global-transition-all h-heading style-1546 style-local-190-c36 position-relative h-element\">\n                  \n                  <div class=\"h-heading__outer style-1546 style-local-190-c36\">\n                    \n                    \n                    <h1 class=\"\">Pre-Attack<\/h1>\n                  <\/div>\n                <\/div>\n              <\/div>\n            <\/div>\n          <\/div>\n        <\/div>\n      <\/div>\n      <div data-colibri-id=\"190-c3\" class=\"h-row-container gutters-row-lg-1 gutters-row-md-1 gutters-row-0 gutters-row-v-lg-1 gutters-row-v-md-1 gutters-row-v-1 style-1541 style-local-190-c3 position-relative\">\n        \n        <div class=\"h-row justify-content-lg-start justify-content-md-start justify-content-start align-items-lg-stretch align-items-md-stretch align-items-stretch gutters-col-lg-1 gutters-col-md-1 gutters-col-0 gutters-col-v-lg-1 gutters-col-v-md-1 gutters-col-v-1\">\n          \n          <div class=\"h-column h-column-container d-flex h-col-lg-4 h-col-md-4 h-col-12 style-1542-outer style-local-190-c4-outer\">\n            <div data-colibri-id=\"190-c4\" class=\"d-flex h-flex-basis h-column__inner h-px-lg-0 h-px-md-0 h-px-0 v-inner-lg-0 v-inner-md-0 v-inner-0 style-1542 style-local-190-c4 position-relative\">\n              \n              \n              <div class=\"w-100 h-y-container h-column__content h-column__v-align flex-basis-100 align-self-lg-start align-self-md-start align-self-start\">\n                \n                <div data-colibri-id=\"190-c5\" class=\"h-global-transition-all h-heading style-328 style-local-190-c5 position-relative h-element\">\n                  \n                  <div class=\"h-heading__outer style-328 style-local-190-c5\">\n                    \n                    \n                    <h3 class=\"\"><strong style=\"font-weight: 700\">Tactic: Reconnaissance<\/strong><\/h3>\n                  <\/div>\n                <\/div>\n                <div data-colibri-id=\"190-c6\" class=\"h-text h-text-component style-329 style-local-190-c6 position-relative h-element\">\n                  \n                  \n                  <div class=\"\">\n                    <p>Recoinnassance techniques (\n                      <a href=\"https:\/\/attack.mitre.org\/tactics\/TA0043\" target=\"_blank\" style=\"font-family: Montserrat;font-weight: 400\" class=\"customize-unpreviewable\" rel=\"noopener\">\n                        <u>Reconnaissance&nbsp;<\/u>\n                      <\/a>\n                      <u>[TA0443]<\/u>) are those activities conducted by the adversary to obtain information with the aim of planning a cyber attack.<\/p>\n                  <\/div>\n                <\/div>\n                <div data-colibri-id=\"190-c7\" class=\"h-global-transition-all h-heading style-1555 style-local-190-c7 position-relative h-element\">\n                  \n                  <div class=\"h-heading__outer style-1555 style-local-190-c7\">\n                    \n                    \n                    <h6 class=\"\">Techniques examples:<\/h6>\n                  <\/div>\n                <\/div>\n                <div data-colibri-id=\"190-c8\" class=\"h-icon style-332 style-local-190-c8 position-relative h-element\">\n                  <span class=\"h-svg-icon h-icon__icon style-332-icon style-local-190-c8-icon\"><!--Icon by Ionicons (https:\/\/ionicons.com)--><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"qr-scanner\" viewBox=\"0 0 416 512\"><path d=\"M48 124v68H0v-68c0-33 28-60 61-60h67v48H60c-7 0-12 5-12 12zm308-60c33 0 60 27 60 60v68h-48v-68c0-7-6-12-13-12h-67V64h68zm12 323v-67h48v67c0 33-27 61-60 61h-68v-49h68c7 0 12-5 12-12zM60 399h68v49H61c-33 0-61-28-61-61v-67h48v67c0 7 5 12 12 12z\"><\/path><\/svg><\/span><\/div>\n                <div data-colibri-id=\"190-c9\" class=\"h-global-transition-all h-heading style-333 style-local-190-c9 position-relative h-element\">\n                  \n                  <div class=\"h-heading__outer style-333 style-local-190-c9\">\n                    \n                    \n                    <h5 class=\"\">Network Scanning<\/h5>\n                  <\/div>\n              <\/div>\n              <div data-colibri-id=\"190-c10\" class=\"style-1554 style-local-190-c10 position-relative h-element\">\n                \n              <\/div>\n              <div data-colibri-id=\"190-c11\" class=\"h-icon style-332 style-local-190-c11 position-relative h-element\">\n                <span class=\"h-svg-icon h-icon__icon style-332-icon style-local-190-c11-icon\"><!--Icon by Font Awesome (https:\/\/fontawesome.com)-->\n    <svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"building-o\" viewBox=\"0 0 1552.451 1896.0833\">\n      <path d=\"M384 1312v64q0 13-9.5 22.5T352 1408h-64q-13 0-22.5-9.5T256 1376v-64q0-13 9.5-22.5t22.5-9.5h64q13 0 22.5 9.5t9.5 22.5zm0-256v64q0 13-9.5 22.5T352 1152h-64q-13 0-22.5-9.5T256 1120v-64q0-13 9.5-22.5t22.5-9.5h64q13 0 22.5 9.5t9.5 22.5zm256 0v64q0 13-9.5 22.5T608 1152h-64q-13 0-22.5-9.5T512 1120v-64q0-13 9.5-22.5t22.5-9.5h64q13 0 22.5 9.5t9.5 22.5zM384 800v64q0 13-9.5 22.5T352 896h-64q-13 0-22.5-9.5T256 864v-64q0-13 9.5-22.5T288 768h64q13 0 22.5 9.5T384 800zm768 512v64q0 13-9.5 22.5t-22.5 9.5h-64q-13 0-22.5-9.5t-9.5-22.5v-64q0-13 9.5-22.5t22.5-9.5h64q13 0 22.5 9.5t9.5 22.5zm-256-256v64q0 13-9.5 22.5T864 1152h-64q-13 0-22.5-9.5T768 1120v-64q0-13 9.5-22.5t22.5-9.5h64q13 0 22.5 9.5t9.5 22.5zM640 800v64q0 13-9.5 22.5T608 896h-64q-13 0-22.5-9.5T512 864v-64q0-13 9.5-22.5T544 768h64q13 0 22.5 9.5T640 800zM384 544v64q0 13-9.5 22.5T352 640h-64q-13 0-22.5-9.5T256 608v-64q0-13 9.5-22.5T288 512h64q13 0 22.5 9.5T384 544zm768 512v64q0 13-9.5 22.5t-22.5 9.5h-64q-13 0-22.5-9.5t-9.5-22.5v-64q0-13 9.5-22.5t22.5-9.5h64q13 0 22.5 9.5t9.5 22.5zM896 800v64q0 13-9.5 22.5T864 896h-64q-13 0-22.5-9.5T768 864v-64q0-13 9.5-22.5T800 768h64q13 0 22.5 9.5T896 800zM640 544v64q0 13-9.5 22.5T608 640h-64q-13 0-22.5-9.5T512 608v-64q0-13 9.5-22.5T544 512h64q13 0 22.5 9.5T640 544zM384 288v64q0 13-9.5 22.5T352 384h-64q-13 0-22.5-9.5T256 352v-64q0-13 9.5-22.5T288 256h64q13 0 22.5 9.5T384 288zm768 512v64q0 13-9.5 22.5T1120 896h-64q-13 0-22.5-9.5T1024 864v-64q0-13 9.5-22.5t22.5-9.5h64q13 0 22.5 9.5t9.5 22.5zM896 544v64q0 13-9.5 22.5T864 640h-64q-13 0-22.5-9.5T768 608v-64q0-13 9.5-22.5T800 512h64q13 0 22.5 9.5T896 544zM640 288v64q0 13-9.5 22.5T608 384h-64q-13 0-22.5-9.5T512 352v-64q0-13 9.5-22.5T544 256h64q13 0 22.5 9.5T640 288zm512 256v64q0 13-9.5 22.5T1120 640h-64q-13 0-22.5-9.5T1024 608v-64q0-13 9.5-22.5t22.5-9.5h64q13 0 22.5 9.5t9.5 22.5zM896 288v64q0 13-9.5 22.5T864 384h-64q-13 0-22.5-9.5T768 352v-64q0-13 9.5-22.5T800 256h64q13 0 22.5 9.5T896 288zm256 0v64q0 13-9.5 22.5T1120 384h-64q-13 0-22.5-9.5T1024 352v-64q0-13 9.5-22.5t22.5-9.5h64q13 0 22.5 9.5t9.5 22.5zM896 1664h384V128H128v1536h384v-224q0-13 9.5-22.5t22.5-9.5h320q13 0 22.5 9.5t9.5 22.5v224zM1408 64v1664q0 26-19 45t-45 19H64q-26 0-45-19t-19-45V64q0-26 19-45T64 0h1280q26 0 45 19t19 45z\"><\/path>\n    <\/svg><\/span><\/div>\n              <div data-colibri-id=\"190-c12\" class=\"h-global-transition-all h-heading style-1553 style-local-190-c12 position-relative h-element\">\n                \n                <div class=\"h-heading__outer style-1553 style-local-190-c12\">\n                  \n                  \n                  <h5 class=\"\">Obtain information on the company perimeter<\/h5>\n                <\/div>\n              <\/div>\n            <\/div>\n          <\/div>\n        <\/div>\n        <div class=\"h-column h-column-container d-flex h-col-lg-4 h-col-md-4 h-col-12 style-1543-outer style-local-190-c13-outer\">\n          <div data-colibri-id=\"190-c13\" class=\"d-flex h-flex-basis h-column__inner h-px-lg-0 h-px-md-0 h-px-0 v-inner-lg-0 v-inner-md-0 v-inner-0 style-1543 style-local-190-c13 position-relative\">\n            \n            \n            <div class=\"w-100 h-y-container h-column__content h-column__v-align flex-basis-100 align-self-lg-start align-self-md-start align-self-start\">\n              \n              <div data-colibri-id=\"190-c14\" class=\"h-global-transition-all h-heading style-328 style-local-190-c14 position-relative h-element\">\n                \n                <div class=\"h-heading__outer style-328 style-local-190-c14\">\n                  \n                  \n                  <h3 class=\"\"><strong style=\"font-weight: 700\">Tactic: Initial Access<br><\/strong><\/h3>\n                <\/div>\n              <\/div>\n              <div data-colibri-id=\"190-c15\" class=\"h-text h-text-component style-329 style-local-190-c15 position-relative h-element\">\n                \n                \n                <div class=\"\">\n                  <p>&#8220;Initial Access&#8221; techniques (\n                    <a href=\"https:\/\/attack.mitre.org\/tactics\/TA0001\" target=\"_blank\" class=\"customize-unpreviewable\" rel=\"noopener\">\n                      <u>Initial Access&nbsp;[TA0001]<\/u>\n                    <\/a>) consist of activities conducted by criminals to access the Company network.<span style=\"font-family: Roboto, RobotoDraft, Helvetica, Arial, sans-serif;font-size: 18px;font-weight: 400\"><br><\/span><\/p>\n                <\/div>\n              <\/div>\n              <div data-colibri-id=\"190-c16\" class=\"h-global-transition-all h-heading style-1558 style-local-190-c16 position-relative h-element\">\n                \n                <div class=\"h-heading__outer style-1558 style-local-190-c16\">\n                  \n                  \n                  <h6 class=\"\">Techniques examples:<\/h6>\n                <\/div>\n              <\/div>\n              <div data-colibri-id=\"190-c17\" class=\"h-icon style-332 style-local-190-c17 position-relative h-element\">\n                <span class=\"h-svg-icon h-icon__icon style-332-icon style-local-190-c17-icon\"><!--Icon by Linea (http:\/\/linea.io)--><svg version=\"1.1\" id=\"Layer_1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" x=\"0px\" y=\"0px\" viewBox=\"0 0 64 64\" enable-background=\"new 0 0 64 64\" xml:space=\"preserve\">\n<g>\n\t<path d=\"M54,0H10v21.142L0,25.335V64h64V25.335l-10-4.193V0z M52,2v29.716L32,44.253L12,31.716V2H52z M10,30.462l-6.835-4.285\n\t\tL10,23.311V30.462z M2,62V27.807l30,18.807l30-18.807V62H2z M60.835,26.177L54,30.462v-7.151L60.835,26.177z\"><\/path>\n\t<path d=\"M28,21h15.811l-3.145-5l3.145-5H28V9h-2v23h2V21z M40.189,13l-1.887,3l1.887,3H28v-6H40.189z\"><\/path>\n<\/g>\n<\/svg>\n<\/span><\/div>\n              <div data-colibri-id=\"190-c18\" class=\"h-global-transition-all h-heading style-345 style-local-190-c18 position-relative h-element\">\n                \n                <div class=\"h-heading__outer style-345 style-local-190-c18\">\n                  \n                  \n                  <h5 class=\"\">Phishing<\/h5>\n                <\/div>\n              <\/div>\n              <div data-colibri-id=\"190-c19\" class=\"h-text h-text-component style-329 style-local-190-c19 position-relative h-element\">\n                \n                \n                <div class=\"\">\n                  <p>Sending emails containing malicious links or attachments. This allows the criminal to access the system or a service (mail).<\/p>\n                <\/div>\n              <\/div>\n              <div data-colibri-id=\"190-c20\" class=\"h-icon style-332 style-local-190-c20 position-relative h-element\">\n                <span class=\"h-svg-icon h-icon__icon style-332-icon style-local-190-c20-icon\"><!--Icon by Font Awesome (https:\/\/fontawesome.com)-->\n    <svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"bomb\" viewBox=\"0 0 1792 1896.0833\">\n      <path d=\"M571 589q-10-25-34-35t-49 0q-108 44-191 127T170 872q-10 25 0 49t35 34q13 5 24 5 42 0 60-40 34-84 98.5-148.5T536 673q25-11 35-35t0-49zm942-356l46 46-244 243 68 68q19 19 19 45.5t-19 45.5l-64 64q89 161 89 343 0 143-55.5 273.5t-150 225-225 150T704 1792t-273.5-55.5-225-150-150-225T0 1088t55.5-273.5 150-225 225-150T704 384q182 0 343 89l64-64q19-19 45.5-19t45.5 19l68 68zm8-56q-10 10-22 10-13 0-23-10l-91-90q-9-10-9-23t9-23q10-9 23-9t23 9l90 91q10 9 10 22.5t-10 22.5zm230 230q-11 9-23 9t-23-9l-90-91q-10-9-10-22.5t10-22.5q9-10 22.5-10t22.5 10l91 90q9 10 9 23t-9 23zm41-183q0 14-9 23t-23 9h-96q-14 0-23-9t-9-23 9-23 23-9h96q14 0 23 9t9 23zM1600 32v96q0 14-9 23t-23 9-23-9-9-23V32q0-14 9-23t23-9 23 9 9 23zm151 55l-91 90q-10 10-22 10-13 0-23-10-10-9-10-22.5t10-22.5l90-91q10-9 23-9t23 9q9 10 9 23t-9 23z\"><\/path>\n    <\/svg><\/span><\/div>\n              <div data-colibri-id=\"190-c21\" class=\"h-global-transition-all h-heading style-345 style-local-190-c21 position-relative h-element\">\n                \n                <div class=\"h-heading__outer style-345 style-local-190-c21\">\n                  \n                  \n                  <h5 class=\"\">Exploitation<\/h5>\n                <\/div>\n              <\/div>\n              <div data-colibri-id=\"190-c22\" class=\"h-global-transition-all h-heading style-345 style-local-190-c22 position-relative h-element\">\n                \n                <div class=\"h-heading__outer style-345 style-local-190-c22\">\n                  \n                  \n                  <h5 class=\"\">Exploitation<\/h5>\n                <\/div>\n              <\/div>\n              <div data-colibri-id=\"190-c23\" class=\"h-text h-text-component style-329 style-local-190-c23 position-relative h-element\">\n                \n                \n                <div class=\"\">\n                  <p>Initiation of offensive activity to exploit a vulnerability present on a perimeter system. Citrix, Microsoft Exchange, Log4j among the most used ones.<\/p>\n                <\/div>\n              <\/div>\n            <\/div>\n          <\/div>\n        <\/div>\n        <div class=\"h-column h-column-container d-flex h-col-lg-4 h-col-md-4 h-col-12 style-1548-outer style-local-190-c24-outer\">\n          <div data-colibri-id=\"190-c24\" class=\"d-flex h-flex-basis h-column__inner h-px-lg-0 h-px-md-0 h-px-0 v-inner-lg-0 v-inner-md-0 v-inner-0 style-1548 style-local-190-c24 position-relative\">\n            \n            \n            <div class=\"w-100 h-y-container h-column__content h-column__v-align flex-basis-100 align-self-lg-start align-self-md-start align-self-start\">\n              \n              <div data-colibri-id=\"190-c25\" class=\"h-global-transition-all h-heading style-328 style-local-190-c25 position-relative h-element\">\n                \n                <div class=\"h-heading__outer style-328 style-local-190-c25\">\n                  \n                  \n                  <h3 class=\"\"><strong style=\"font-weight: 700\">Tactic: Execution<br><\/strong><\/h3>\n                <\/div>\n              <\/div>\n              <div data-colibri-id=\"190-c26\" class=\"h-text h-text-component style-329 style-local-190-c26 position-relative h-element\">\n                \n                \n                <div class=\"\">\n                  <p>&#8220;Execution&#8221; techniques (\n                    <a href=\"https:\/\/attack.mitre.org\/tactics\/TA0002\" target=\"_blank\" class=\"customize-unpreviewable\" rel=\"noopener\">\n                      <u>Execution [TA0002]<\/u>\n                    <\/a>) are those activities conducted by the adversary to execute malicious code. In this way adversaries gain control of the system or a modification to it.\n                    <br>\n                  <\/p>\n                <\/div>\n              <\/div>\n              <div data-colibri-id=\"190-c27\" class=\"h-global-transition-all h-heading style-1559 style-local-190-c27 position-relative h-element\">\n                \n                <div class=\"h-heading__outer style-1559 style-local-190-c27\">\n                  \n                  \n                  <h6 class=\"\">Techniques examples::<\/h6>\n                <\/div>\n              <\/div>\n              <div data-colibri-id=\"190-c28\" class=\"h-icon style-332 style-local-190-c28 position-relative h-element\">\n                <span class=\"h-svg-icon h-icon__icon style-332-icon style-local-190-c28-icon\"><!--Icon by Icons8 Line Awesome (https:\/\/icons8.com\/line-awesome)--><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"code-fork\" viewBox=\"0 0 512 545.5\"><path d=\"M64 112h384v352H64V112zm32 32v32h320v-32H96zm0 64v224h320V208H96zm160 32h32l-32 160h-32zm-77 6.5l26 19-41 54.5 41 54.5-26 19-48-64-7-9.5 7-9.5zm154 0l48 64 7 9.5-7 9.5-48 64-26-19 41-54.5-41-54.5z\"><\/path><\/svg><\/span><\/div>\n              <div data-colibri-id=\"190-c29\" class=\"h-global-transition-all h-heading style-333 style-local-190-c29 position-relative h-element\">\n                \n                <div class=\"h-heading__outer style-333 style-local-190-c29\">\n                  \n                  \n                  <h5 class=\"\">Commands and scripts interpreter<\/h5>\n                <\/div>\n            <\/div>\n            <div data-colibri-id=\"190-c30\" class=\"h-text h-text-component style-329 style-local-190-c30 position-relative h-element\">\n              \n              \n              <div class=\"\">\n                <p>Execution of malicious commands or scripts. Often abused: Powershell, Windows Command, Unix Shell, Javascript, etc&#8230;<\/p>\n              <\/div>\n            <\/div>\n            <div data-colibri-id=\"190-c31\" class=\"h-icon style-332 style-local-190-c31 position-relative h-element\">\n              <span class=\"h-svg-icon h-icon__icon style-332-icon style-local-190-c31-icon\"><!--Icon by Font Awesome (https:\/\/fontawesome.com)-->\n    <svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"user\" viewBox=\"0 0 1354.8114 1896.0833\">\n      <path d=\"M1280 1399q0 109-62.5 187t-150.5 78H213q-88 0-150.5-78T0 1399q0-85 8.5-160.5t31.5-152 58.5-131 94-89T327 832q131 128 313 128t313-128q76 0 134.5 34.5t94 89 58.5 131 31.5 152 8.5 160.5zm-256-887q0 159-112.5 271.5T640 896 368.5 783.5 256 512t112.5-271.5T640 128t271.5 112.5T1024 512z\"><\/path>\n    <\/svg><\/span><\/div>\n            <div data-colibri-id=\"190-c32\" class=\"h-global-transition-all h-heading style-333 style-local-190-c32 position-relative h-element\">\n              \n              <div class=\"h-heading__outer style-333 style-local-190-c32\">\n                \n                \n                <h5 class=\"\">User Execution<\/h5>\n              <\/div>\n            <\/div>\n            <div data-colibri-id=\"190-c33\" class=\"h-text h-text-component style-329 style-local-190-c33 position-relative h-element\">\n              \n              \n              <div class=\"\">\n                <p>Execution of malicious code through interaction with the victim user.<\/p>\n              <\/div>\n            <\/div>\n          <\/div>\n        <\/div>\n      <\/div>\n    <\/div>\n  <\/div>\n<\/div>\n<\/div>\n<div data-colibri-component=\"section\" data-colibri-id=\"190-c37\" id=\"durante-1\" class=\"h-section h-section-global-spacing d-flex align-items-lg-center align-items-md-center align-items-center style-1557 style-local-190-c37 position-relative\">\n  \n  \n  <div class=\"h-section-grid-container h-section-boxed-container\">\n    <div data-colibri-id=\"190-c69\" class=\"h-row-container gutters-row-lg-2 gutters-row-md-2 gutters-row-0 gutters-row-v-lg-2 gutters-row-v-md-2 gutters-row-v-2 style-1544 style-local-190-c69 position-relative\">\n      \n      <div class=\"h-row justify-content-lg-center justify-content-md-center justify-content-center align-items-lg-stretch align-items-md-stretch align-items-stretch gutters-col-lg-2 gutters-col-md-2 gutters-col-0 gutters-col-v-lg-2 gutters-col-v-md-2 gutters-col-v-2\">\n        \n        <div class=\"h-column h-column-container d-flex h-col-lg-12 h-col-md-12 h-col-12 style-1545-outer style-local-190-c70-outer\">\n          <div data-colibri-id=\"190-c70\" class=\"d-flex h-flex-basis h-column__inner h-px-lg-2 h-px-md-2 h-px-2 v-inner-lg-2 v-inner-md-2 v-inner-2 style-1545 style-local-190-c70 position-relative\">\n            \n            \n            <div class=\"w-100 h-y-container h-column__content h-column__v-align flex-basis-100 align-self-lg-start align-self-md-start align-self-start\">\n              \n              <div data-colibri-id=\"190-c71\" class=\"h-global-transition-all h-heading style-1546 style-local-190-c71 position-relative h-element\">\n                \n                <div class=\"h-heading__outer style-1546 style-local-190-c71\">\n                  \n                  \n                  <h1 class=\"\">During<\/h1>\n                <\/div>\n              <\/div>\n            <\/div>\n          <\/div>\n        <\/div>\n      <\/div>\n    <\/div>\n    <div data-colibri-id=\"190-c38\" class=\"h-row-container gutters-row-lg-1 gutters-row-md-1 gutters-row-0 gutters-row-v-lg-1 gutters-row-v-md-1 gutters-row-v-1 style-1541 style-local-190-c38 position-relative\">\n      \n      <div class=\"h-row justify-content-lg-start justify-content-md-start justify-content-start align-items-lg-stretch align-items-md-stretch align-items-stretch gutters-col-lg-1 gutters-col-md-1 gutters-col-0 gutters-col-v-lg-1 gutters-col-v-md-1 gutters-col-v-1\">\n        \n        <div class=\"h-column h-column-container d-flex h-col-lg-4 h-col-md-4 h-col-12 style-1542-outer style-local-190-c39-outer\">\n          <div data-colibri-id=\"190-c39\" class=\"d-flex h-flex-basis h-column__inner h-px-lg-0 h-px-md-0 h-px-0 v-inner-lg-0 v-inner-md-0 v-inner-0 style-1542 style-local-190-c39 position-relative\">\n            \n            \n            <div class=\"w-100 h-y-container h-column__content h-column__v-align flex-basis-100 align-self-lg-start align-self-md-start align-self-start\">\n              \n              <div data-colibri-id=\"190-c40\" class=\"h-global-transition-all h-heading style-328 style-local-190-c40 position-relative h-element\">\n                \n                <div class=\"h-heading__outer style-328 style-local-190-c40\">\n                  \n                  \n                  <h3 class=\"\"><strong style=\"font-weight: 700\">Tactic: Persistence<\/strong><\/h3>\n                <\/div>\n              <\/div>\n              <div data-colibri-id=\"190-c41\" class=\"h-text h-text-component style-329 style-local-190-c41 position-relative h-element\">\n                \n                \n                <div class=\"\">\n                  <p>&#8220;Persistence&#8221; techniques (\n                    <a href=\"https:\/\/attack.mitre.org\/tactics\/TA0003\" target=\"_blank\" class=\"customize-unpreviewable\" rel=\"noopener\">\n                      <u>Persistence [TA0003]<\/u>\n                    <\/a>) consist of activities conducted by criminals to maintain persistent access to the system, infrastructure or service (email).<span style=\"font-weight: 400;font-size: 18px;font-family: Roboto, RobotoDraft, Helvetica, Arial, sans-serif\"><br><\/span><\/p>\n                <\/div>\n              <\/div>\n              <div data-colibri-id=\"190-c42\" class=\"h-global-transition-all h-heading style-1555 style-local-190-c42 position-relative h-element\">\n                \n                <div class=\"h-heading__outer style-1555 style-local-190-c42\">\n                  \n                  \n                  <h6 class=\"\">Techniques examples:<\/h6>\n                <\/div>\n              <\/div>\n              <div data-colibri-id=\"190-c43\" class=\"h-icon style-332 style-local-190-c43 position-relative h-element\">\n                <span class=\"h-svg-icon h-icon__icon style-332-icon style-local-190-c43-icon\"><!--Icon by Font Awesome (https:\/\/fontawesome.com)-->\n    <svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"stack-overflow\" viewBox=\"0 0 1536 1896.0833\">\n      <path d=\"M1289 1632H171v-480H11v640h1438v-640h-160v480zm-942-524l33-157 783 165-33 156zm103-374l67-146 725 339-67 145zm201-356l102-123 614 513-102 123zM1048 0l477 641-128 96L920 96zM330 1471v-159h800v159H330z\"><\/path>\n    <\/svg><\/span><\/div>\n              <div data-colibri-id=\"190-c44\" class=\"h-global-transition-all h-heading style-333 style-local-190-c44 position-relative h-element\">\n                \n                <div class=\"h-heading__outer style-333 style-local-190-c44\">\n                  \n                  \n                  <h5 class=\"\">Scheduled Tasks<\/h5>\n                <\/div>\n              <\/div>\n              <div data-colibri-id=\"190-c45\" class=\"h-text h-text-component style-329 style-local-190-c45 position-relative h-element\">\n                \n                \n                <div class=\"\">\n                  <p>Use of Scheduled Tasks (Windows and Linux) to launch malicious code upon system reboot or at specific times.<\/p>\n                <\/div>\n              <\/div>\n              <div data-colibri-id=\"190-c46\" class=\"h-icon style-332 style-local-190-c46 position-relative h-element\">\n                <span class=\"h-svg-icon h-icon__icon style-332-icon style-local-190-c46-icon\"><!--Icon by Font Awesome (https:\/\/fontawesome.com)-->\n    <svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"user-circle\" viewBox=\"0 0 1792 1896.0833\">\n      <path d=\"M1523 1339q-22-155-87.5-257.5T1251 963q-67 74-159.5 115.5T896 1120t-195.5-41.5T541 963q-119 16-184.5 118.5T269 1339q106 150 271 237.5t356 87.5 356-87.5 271-237.5zm-243-699q0-159-112.5-271.5T896 256 624.5 368.5 512 640t112.5 271.5T896 1024t271.5-112.5T1280 640zm512 256q0 182-71 347.5t-190.5 286T1245 1721t-349 71q-182 0-348-71t-286-191-191-286T0 896t71-348 191-286T548 71 896 0t348 71 286 191 191 286 71 348z\"><\/path>\n    <\/svg><\/span><\/div>\n              <div data-colibri-id=\"190-c47\" class=\"h-global-transition-all h-heading style-1553 style-local-190-c47 position-relative h-element\">\n                \n                <div class=\"h-heading__outer style-1553 style-local-190-c47\">\n                  \n                  \n                  <h5 class=\"\">Valid Accounts<\/h5>\n                <\/div>\n              <\/div>\n              <div data-colibri-id=\"190-c48\" class=\"h-text h-text-component style-329 style-local-190-c48 position-relative h-element\">\n                \n                \n                <div class=\"\">\n                  <p>Use of valid credentials to access the system (Active Directory Domain account), the Network (access via VPN) or the service (email access).<\/p>\n                <\/div>\n              <\/div>\n            <\/div>\n          <\/div>\n        <\/div>\n        <div class=\"h-column h-column-container d-flex h-col-lg-4 h-col-md-4 h-col-12 style-1543-outer style-local-190-c49-outer\">\n          <div data-colibri-id=\"190-c49\" class=\"d-flex h-flex-basis h-column__inner h-px-lg-0 h-px-md-0 h-px-0 v-inner-lg-0 v-inner-md-0 v-inner-0 style-1543 style-local-190-c49 position-relative\">\n            \n            \n            <div class=\"w-100 h-y-container h-column__content h-column__v-align flex-basis-100 align-self-lg-start align-self-md-start align-self-start\">\n              \n              <div data-colibri-id=\"190-c50\" class=\"h-global-transition-all h-heading style-328 style-local-190-c50 position-relative h-element\">\n                \n                <div class=\"h-heading__outer style-328 style-local-190-c50\">\n                  \n                  \n                  <h3 class=\"\"><strong style=\"font-weight: 700\">Tactic: Privilege Escalation<br><\/strong><\/h3>\n                <\/div>\n              <\/div>\n              <div data-colibri-id=\"190-c51\" class=\"h-text h-text-component style-329 style-local-190-c51 position-relative h-element\">\n                \n                \n                <div class=\"\">\n                  <p>&#8220;Privilege Escalation&#8221; techniques (\n                    <a href=\"https:\/\/attack.mitre.org\/tactics\/TA0004\" target=\"_blank\" class=\"customize-unpreviewable\" rel=\"noopener\">\n                      <u>Privilege Escalation [TA0004]<\/u>\n                    <\/a>) are those activities conducted by the adversary to increase their privileges in the system or network. This way they gain greater control and freedom of movement.<span style=\"font-weight: 400;font-size: 18px;font-family: Roboto, RobotoDraft, Helvetica, Arial, sans-serif\"><br><\/span><\/p>\n                <\/div>\n              <\/div>\n              <div data-colibri-id=\"190-c52\" class=\"h-global-transition-all h-heading style-1556 style-local-190-c52 position-relative h-element\">\n                \n                <div class=\"h-heading__outer style-1556 style-local-190-c52\">\n                  \n                  \n                  <h6 class=\"\">Techniques examples:<\/h6>\n                <\/div>\n              <\/div>\n              <div data-colibri-id=\"190-c53\" class=\"h-icon style-332 style-local-190-c53 position-relative h-element\">\n                <span class=\"h-svg-icon h-icon__icon style-332-icon style-local-190-c53-icon\"><!--Icon by Material Icons (https:\/\/material.io)--><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"autorenew\" viewBox=\"0 0 512 512\"><path d=\"M400 165q27 41 27 91 0 70-50.5 120.5T256 427v64l-85-86 85-85v64q53 0 90.5-37.5T384 256q0-30-15-60l31-31zm-144-37q-53 0-90.5 37.5T128 256q0 33 15 60l-31 31q-27-41-27-91 0-70 50.5-120.5T256 85V21l85 86-85 85v-64z\"><\/path><\/svg><\/span><\/div>\n              <div data-colibri-id=\"190-c54\" class=\"h-global-transition-all h-heading style-345 style-local-190-c54 position-relative h-element\">\n                \n                <div class=\"h-heading__outer style-345 style-local-190-c54\">\n                  \n                  \n                  <h5 class=\"\">Token Manipulation<\/h5>\n                <\/div>\n            <\/div>\n            <div data-colibri-id=\"190-c55\" class=\"h-text h-text-component style-329 style-local-190-c55 position-relative h-element\">\n              \n              \n              <div class=\"\">\n                <p>Adversaries can manipulate access tokens to make a running process appear to be the child of a different process. In this case the process also takes on the security context associated with the new token.<\/p>\n              <\/div>\n            <\/div>\n            <div data-colibri-id=\"190-c56\" class=\"h-icon style-332 style-local-190-c56 position-relative h-element\">\n              <span class=\"h-svg-icon h-icon__icon style-332-icon style-local-190-c56-icon\"><!--Icon by Font Awesome (https:\/\/fontawesome.com)-->\n    <svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"bomb\" viewBox=\"0 0 1792 1896.0833\">\n      <path d=\"M571 589q-10-25-34-35t-49 0q-108 44-191 127T170 872q-10 25 0 49t35 34q13 5 24 5 42 0 60-40 34-84 98.5-148.5T536 673q25-11 35-35t0-49zm942-356l46 46-244 243 68 68q19 19 19 45.5t-19 45.5l-64 64q89 161 89 343 0 143-55.5 273.5t-150 225-225 150T704 1792t-273.5-55.5-225-150-150-225T0 1088t55.5-273.5 150-225 225-150T704 384q182 0 343 89l64-64q19-19 45.5-19t45.5 19l68 68zm8-56q-10 10-22 10-13 0-23-10l-91-90q-9-10-9-23t9-23q10-9 23-9t23 9l90 91q10 9 10 22.5t-10 22.5zm230 230q-11 9-23 9t-23-9l-90-91q-10-9-10-22.5t10-22.5q9-10 22.5-10t22.5 10l91 90q9 10 9 23t-9 23zm41-183q0 14-9 23t-23 9h-96q-14 0-23-9t-9-23 9-23 23-9h96q14 0 23 9t9 23zM1600 32v96q0 14-9 23t-23 9-23-9-9-23V32q0-14 9-23t23-9 23 9 9 23zm151 55l-91 90q-10 10-22 10-13 0-23-10-10-9-10-22.5t10-22.5l90-91q10-9 23-9t23 9q9 10 9 23t-9 23z\"><\/path>\n    <\/svg><\/span><\/div>\n            <div data-colibri-id=\"190-c57\" class=\"h-global-transition-all h-heading style-345 style-local-190-c57 position-relative h-element\">\n              \n              <div class=\"h-heading__outer style-345 style-local-190-c57\">\n                \n                \n                <h5 class=\"\">Exploitation<\/h5>\n              <\/div>\n            <\/div>\n            <div data-colibri-id=\"190-c58\" class=\"h-text h-text-component style-329 style-local-190-c58 position-relative h-element\">\n              \n              \n              <div class=\"\">\n                <p>Adversaries can exploit software vulnerabilities in an attempt to elevate privileges. Exploitation of a vulnerability occurs when an adversary exploits a programming flaw to execute adversary-controlled code.<\/p>\n              <\/div>\n            <\/div>\n          <\/div>\n        <\/div>\n      <\/div>\n      <div class=\"h-column h-column-container d-flex h-col-lg-4 h-col-md-4 h-col-12 style-1548-outer style-local-190-c59-outer\">\n        <div data-colibri-id=\"190-c59\" class=\"d-flex h-flex-basis h-column__inner h-px-lg-0 h-px-md-0 h-px-0 v-inner-lg-0 v-inner-md-0 v-inner-0 style-1548 style-local-190-c59 position-relative\">\n          \n          \n          <div class=\"w-100 h-y-container h-column__content h-column__v-align flex-basis-100 align-self-lg-start align-self-md-start align-self-start\">\n            \n            <div data-colibri-id=\"190-c60\" class=\"h-global-transition-all h-heading style-328 style-local-190-c60 position-relative h-element\">\n              \n              <div class=\"h-heading__outer style-328 style-local-190-c60\">\n                \n                \n                <h3 class=\"\"><strong style=\"font-weight: 700\">Tactic: Defence Evasion<br><\/strong><\/h3>\n              <\/div>\n            <\/div>\n            <div data-colibri-id=\"190-c61\" class=\"h-text h-text-component style-329 style-local-190-c61 position-relative h-element\">\n              \n              \n              <div class=\"\">\n                <p>&#8220;Defence Evasion&#8221; techniques (\n                  <a href=\"https:\/\/attack.mitre.org\/tactics\/TA0005\" target=\"_blank\" class=\"customize-unpreviewable\" rel=\"noopener\">\n                    <u>Defence Evasion [TA0005]<\/u>\n                  <\/a>) consist of activities conducted by criminals to evade system or network defense tools.<span style=\"font-family: Roboto, RobotoDraft, Helvetica, Arial, sans-serif;font-size: 18px;font-weight: 400\"><br><\/span><\/p>\n              <\/div>\n            <\/div>\n            <div data-colibri-id=\"190-c62\" class=\"h-global-transition-all h-heading style-1555 style-local-190-c62 position-relative h-element\">\n              \n              <div class=\"h-heading__outer style-1555 style-local-190-c62\">\n                \n                \n                <h6 class=\"\">Techniques examples:<\/h6>\n              <\/div>\n            <\/div>\n            <div data-colibri-id=\"190-c63\" class=\"h-icon style-332 style-local-190-c63 position-relative h-element\">\n              <span class=\"h-svg-icon h-icon__icon style-332-icon style-local-190-c63-icon\"><!--Icon by Material Icons (https:\/\/material.io)--><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"autorenew\" viewBox=\"0 0 512 512\"><path d=\"M400 165q27 41 27 91 0 70-50.5 120.5T256 427v64l-85-86 85-85v64q53 0 90.5-37.5T384 256q0-30-15-60l31-31zm-144-37q-53 0-90.5 37.5T128 256q0 33 15 60l-31 31q-27-41-27-91 0-70 50.5-120.5T256 85V21l85 86-85 85v-64z\"><\/path><\/svg><\/span><\/div>\n            <div data-colibri-id=\"190-c64\" class=\"h-global-transition-all h-heading style-333 style-local-190-c64 position-relative h-element\">\n              \n              <div class=\"h-heading__outer style-333 style-local-190-c64\">\n                \n                \n                <h5 class=\"\">Token Manipulation<\/h5>\n              <\/div>\n          <\/div>\n          <div data-colibri-id=\"190-c65\" class=\"h-text h-text-component style-329 style-local-190-c65 position-relative h-element\">\n            \n            \n            <div class=\"\">\n              <p>Adversaries can modify access tokens to operate in a different system or user security context to perform actions and bypass access controls.<\/p>\n            <\/div>\n          <\/div>\n          <div data-colibri-id=\"190-c66\" class=\"h-icon style-332 style-local-190-c66 position-relative h-element\">\n            <span class=\"h-svg-icon h-icon__icon style-332-icon style-local-190-c66-icon\"><!--Icon by Font Awesome (https:\/\/fontawesome.com)-->\n    <svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"user-circle\" viewBox=\"0 0 1792 1896.0833\">\n      <path d=\"M1523 1339q-22-155-87.5-257.5T1251 963q-67 74-159.5 115.5T896 1120t-195.5-41.5T541 963q-119 16-184.5 118.5T269 1339q106 150 271 237.5t356 87.5 356-87.5 271-237.5zm-243-699q0-159-112.5-271.5T896 256 624.5 368.5 512 640t112.5 271.5T896 1024t271.5-112.5T1280 640zm512 256q0 182-71 347.5t-190.5 286T1245 1721t-349 71q-182 0-348-71t-286-191-191-286T0 896t71-348 191-286T548 71 896 0t348 71 286 191 191 286 71 348z\"><\/path>\n    <\/svg><\/span><\/div>\n          <div data-colibri-id=\"190-c67\" class=\"h-global-transition-all h-heading style-333 style-local-190-c67 position-relative h-element\">\n            \n            <div class=\"h-heading__outer style-333 style-local-190-c67\">\n              \n              \n              <h5 class=\"\">Valid Accounts<\/h5>\n            <\/div>\n          <\/div>\n          <div data-colibri-id=\"190-c68\" class=\"h-text h-text-component style-329 style-local-190-c68 position-relative h-element\">\n            \n            \n            <div class=\"\">\n              <p>Adversaries can execute their own malicious payloads by hijacking how operating systems run programs.<\/p>\n            <\/div>\n          <\/div>\n        <\/div>\n      <\/div>\n    <\/div>\n  <\/div>\n<\/div>\n<\/div>\n<\/div>\n<div data-colibri-component=\"section\" data-colibri-id=\"190-c72\" id=\"durante-2\" class=\"h-section h-section-global-spacing d-flex align-items-lg-center align-items-md-center align-items-center style-1560 style-local-190-c72 position-relative\">\n  \n  \n  <div class=\"h-section-grid-container h-section-boxed-container\">\n    \n    <div data-colibri-id=\"190-c73\" class=\"h-row-container gutters-row-lg-1 gutters-row-md-1 gutters-row-0 gutters-row-v-lg-1 gutters-row-v-md-1 gutters-row-v-1 style-1541 style-local-190-c73 position-relative\">\n      \n      <div class=\"h-row justify-content-lg-start justify-content-md-start justify-content-start align-items-lg-stretch align-items-md-stretch align-items-stretch gutters-col-lg-1 gutters-col-md-1 gutters-col-0 gutters-col-v-lg-1 gutters-col-v-md-1 gutters-col-v-1\">\n        \n        <div class=\"h-column h-column-container d-flex h-col-lg-4 h-col-md-4 h-col-12 style-1542-outer style-local-190-c74-outer\">\n          <div data-colibri-id=\"190-c74\" class=\"d-flex h-flex-basis h-column__inner h-px-lg-0 h-px-md-0 h-px-0 v-inner-lg-0 v-inner-md-0 v-inner-0 style-1542 style-local-190-c74 position-relative\">\n            \n            \n            <div class=\"w-100 h-y-container h-column__content h-column__v-align flex-basis-100 align-self-lg-start align-self-md-start align-self-start\">\n              \n              <div data-colibri-id=\"190-c75\" class=\"h-global-transition-all h-heading style-328 style-local-190-c75 position-relative h-element\">\n                \n                <div class=\"h-heading__outer style-328 style-local-190-c75\">\n                  \n                  \n                  <h3 class=\"\"><strong style=\"font-weight: 700\">Tactic: Credential Access<br><\/strong><\/h3>\n                <\/div>\n              <\/div>\n              <div data-colibri-id=\"190-c76\" class=\"h-text h-text-component style-329 style-local-190-c76 position-relative h-element\">\n                \n                \n                <div class=\"\">\n                  <p>&#8220;Credential Access&#8221; techniques (\n                    <a href=\"https:\/\/attack.mitre.org\/tactics\/TA0006\" target=\"_blank\" class=\"customize-unpreviewable\" rel=\"noopener\">\n                      <u>Credential Access&nbsp;[TA0006]<\/u>\n                    <\/a>) are those activities conducted by the adversary to obtain access credentials to the system or service (username; password; token; etc.) in order to obtain legitimate access.<span style=\"font-family: Roboto, RobotoDraft, Helvetica, Arial, sans-serif;font-size: 18px;font-weight: 400\"><br><\/span><\/p>\n                <\/div>\n              <\/div>\n              <div data-colibri-id=\"190-c77\" class=\"h-global-transition-all h-heading style-1555 style-local-190-c77 position-relative h-element\">\n                \n                <div class=\"h-heading__outer style-1555 style-local-190-c77\">\n                  \n                  \n                  <h6 class=\"\">Techniques examples:<\/h6>\n                <\/div>\n              <\/div>\n              <div data-colibri-id=\"190-c78\" class=\"h-icon style-332 style-local-190-c78 position-relative h-element\">\n                <span class=\"h-svg-icon h-icon__icon style-332-icon style-local-190-c78-icon\"><!--Icon by Linea (http:\/\/linea.io)--><svg version=\"1.1\" id=\"Layer_1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" x=\"0px\" y=\"0px\" viewBox=\"0 0 64 64\" enable-background=\"new 0 0 64 64\" xml:space=\"preserve\">\n<g>\n\t<path d=\"M41,37.586L23.414,20l12-12l-5.305-5.302l-0.688,0.486c-0.025,0.018-2.537,1.769-5.671,1.769\n\t\tc-2.244,0-4.277-0.896-6.043-2.66L17,1.586L-0.414,19L12,31.414l10-10L39.586,39l-3,3L57,62.414L64.414,55L44,34.586L41,37.586z\n\t\t M2.414,19L17.026,4.388c1.983,1.703,4.241,2.565,6.724,2.565c2.722,0,4.992-1.057,6.103-1.687L32.586,8L12,28.586L2.414,19z\n\t\t M57,59.586L39.414,42L44,37.414L61.586,55L57,59.586z\"><\/path>\n<\/g>\n<\/svg>\n<\/span><\/div>\n              <div data-colibri-id=\"190-c79\" class=\"h-global-transition-all h-heading style-333 style-local-190-c79 position-relative h-element\">\n                \n                <div class=\"h-heading__outer style-333 style-local-190-c79\">\n                  \n                  \n                  <h5 class=\"\">Brute Force<\/h5>\n                <\/div>\n              <\/div>\n              <div data-colibri-id=\"190-c80\" class=\"h-text h-text-component style-329 style-local-190-c80 position-relative h-element\">\n                \n                \n                <div class=\"\">\n                  <p>Adversaries can use brute force techniques to access accounts when passwords are unknown or when password hashes are obtained.<\/p>\n                <\/div>\n              <\/div>\n              <div data-colibri-id=\"190-c81\" class=\"h-icon style-332 style-local-190-c81 position-relative h-element\">\n                <span class=\"h-svg-icon h-icon__icon style-332-icon style-local-190-c81-icon\"><!--Icon by Font Awesome (https:\/\/fontawesome.com)-->\n    <svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"user-circle\" viewBox=\"0 0 1792 1896.0833\">\n      <path d=\"M1523 1339q-22-155-87.5-257.5T1251 963q-67 74-159.5 115.5T896 1120t-195.5-41.5T541 963q-119 16-184.5 118.5T269 1339q106 150 271 237.5t356 87.5 356-87.5 271-237.5zm-243-699q0-159-112.5-271.5T896 256 624.5 368.5 512 640t112.5 271.5T896 1024t271.5-112.5T1280 640zm512 256q0 182-71 347.5t-190.5 286T1245 1721t-349 71q-182 0-348-71t-286-191-191-286T0 896t71-348 191-286T548 71 896 0t348 71 286 191 191 286 71 348z\"><\/path>\n    <\/svg><\/span><\/div>\n              <div data-colibri-id=\"190-c82\" class=\"h-global-transition-all h-heading style-1553 style-local-190-c82 position-relative h-element\">\n                \n                <div class=\"h-heading__outer style-1553 style-local-190-c82\">\n                  \n                  \n                  <h5 class=\"\">Credentials Dump<\/h5>\n                <\/div>\n              <\/div>\n              <div data-colibri-id=\"190-c83\" class=\"h-text h-text-component style-329 style-local-190-c83 position-relative h-element\">\n                \n                \n                <div class=\"\">\n                  <p>Adversaries can exfiltrate credentials after a system is compromised, obtaining hashes or plaintext information. Technique used to perform lateral movements.<\/p>\n                <\/div>\n              <\/div>\n            <\/div>\n          <\/div>\n        <\/div>\n        <div class=\"h-column h-column-container d-flex h-col-lg-4 h-col-md-4 h-col-12 style-1543-outer style-local-190-c84-outer\">\n          <div data-colibri-id=\"190-c84\" class=\"d-flex h-flex-basis h-column__inner h-px-lg-0 h-px-md-0 h-px-0 v-inner-lg-0 v-inner-md-0 v-inner-0 style-1543 style-local-190-c84 position-relative\">\n            \n            \n            <div class=\"w-100 h-y-container h-column__content h-column__v-align flex-basis-100 align-self-lg-start align-self-md-start align-self-start\">\n              \n              <div data-colibri-id=\"190-c85\" class=\"h-global-transition-all h-heading style-328 style-local-190-c85 position-relative h-element\">\n                \n                <div class=\"h-heading__outer style-328 style-local-190-c85\">\n                  \n                  \n                  <h3 class=\"\"><strong style=\"font-weight: 700\">Tactic: Discovery<br><\/strong><\/h3>\n                <\/div>\n              <\/div>\n              <div data-colibri-id=\"190-c86\" class=\"h-text h-text-component style-329 style-local-190-c86 position-relative h-element\">\n                \n                \n                <div class=\"\">\n                  <p>&#8220;Discovery&#8221; techniques (\n                    <a href=\"https:\/\/attack.mitre.org\/tactics\/TA0007\" target=\"_blank\" class=\"customize-unpreviewable\" rel=\"noopener\">\n                      <u>Discovery&nbsp;[TA0007]<\/u>\n                    <\/a>) are those activities conducted by the adversary to obtain information about the IT environment. These are usually post-compromise activities performed by the adversary to understand how to move within the network.<span style=\"font-weight: 400;font-size: 18px;font-family: Roboto, RobotoDraft, Helvetica, Arial, sans-serif\"><br><\/span><\/p>\n                <\/div>\n              <\/div>\n              <div data-colibri-id=\"190-c87\" class=\"h-global-transition-all h-heading style-1556 style-local-190-c87 position-relative h-element\">\n                \n                <div class=\"h-heading__outer style-1556 style-local-190-c87\">\n                  \n                  \n                  <h6 class=\"\">Techniques examples:<\/h6>\n                <\/div>\n              <\/div>\n              <div data-colibri-id=\"190-c88\" class=\"h-icon style-332 style-local-190-c88 position-relative h-element\">\n                <span class=\"h-svg-icon h-icon__icon style-332-icon style-local-190-c88-icon\"><!--Icon by Ionicons (https:\/\/ionicons.com)--><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"network\" viewBox=\"0 0 384 512\"><path d=\"M384 96c0 24-13 44-32 55v93l-128 64v53c19 11 32 31 32 55 0 35-29 64-64 64s-64-29-64-64c0-24 13-44 32-55v-53L32 244v-93C13 140 0 120 0 96c0-35 29-64 64-64s64 29 64 64c0 24-13 44-32 55v53l96 48 96-48v-53c-19-11-32-31-32-55 0-35 29-64 64-64s64 29 64 64zM64 64c-18 0-32 14-32 32s14 32 32 32 32-14 32-32-14-32-32-32zm128 384c18 0 32-14 32-32s-14-32-32-32-32 14-32 32 14 32 32 32zm128-320c18 0 32-14 32-32s-14-32-32-32-32 14-32 32 14 32 32 32z\"><\/path><\/svg><\/span><\/div>\n              <div data-colibri-id=\"190-c89\" class=\"h-global-transition-all h-heading style-345 style-local-190-c89 position-relative h-element\">\n                \n                <div class=\"h-heading__outer style-345 style-local-190-c89\">\n                  \n                  \n                  <h5 class=\"\">Network Scanning<\/h5>\n                <\/div>\n            <\/div>\n            <div data-colibri-id=\"190-c90\" class=\"h-text h-text-component style-329 style-local-190-c90 position-relative h-element\">\n              \n              \n              <div class=\"\">\n                <p>Adversaries often conduct post-compromise network scanning activities. In this way they identify new target systems for internal movements.<\/p>\n              <\/div>\n            <\/div>\n            <div data-colibri-id=\"190-c91\" class=\"h-icon style-332 style-local-190-c91 position-relative h-element\">\n              <span class=\"h-svg-icon h-icon__icon style-332-icon style-local-190-c91-icon\"><!--Icon by Foundation Icons (https:\/\/zurb.com\/playground\/foundation-icon-fonts-3)--><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"social-forrst\" viewBox=\"0 0 350 512.5\"><path d=\"M350 466.25h-65v-1h-92v-66l73-36-9-18-64 33v-25l43-22-10-18-33 18v-43h-46v67l-33-23-11 16 44 31v86H0l175-419z\"><\/path><\/svg><\/span><\/div>\n            <div data-colibri-id=\"190-c92\" class=\"h-global-transition-all h-heading style-345 style-local-190-c92 position-relative h-element\">\n              \n              <div class=\"h-heading__outer style-345 style-local-190-c92\">\n                \n                \n                <h5 class=\"\">Domain discovery<\/h5>\n              <\/div>\n          <\/div>\n          <div data-colibri-id=\"190-c93\" class=\"h-text h-text-component style-329 style-local-190-c93 position-relative h-element\">\n            \n            \n            <div class=\"\">\n              <p>Adversaries perform Active Directory environment enumeration tasks. In this way they can exploit AD logics to perform further movements.<\/p>\n            <\/div>\n          <\/div>\n        <\/div>\n      <\/div>\n    <\/div>\n    <div class=\"h-column h-column-container d-flex h-col-lg-4 h-col-md-4 h-col-12 style-1548-outer style-local-190-c94-outer\">\n      <div data-colibri-id=\"190-c94\" class=\"d-flex h-flex-basis h-column__inner h-px-lg-0 h-px-md-0 h-px-0 v-inner-lg-0 v-inner-md-0 v-inner-0 style-1548 style-local-190-c94 position-relative\">\n        \n        \n        <div class=\"w-100 h-y-container h-column__content h-column__v-align flex-basis-100 align-self-lg-start align-self-md-start align-self-start\">\n          \n          <div data-colibri-id=\"190-c95\" class=\"h-global-transition-all h-heading style-328 style-local-190-c95 position-relative h-element\">\n            \n            <div class=\"h-heading__outer style-328 style-local-190-c95\">\n              \n              \n              <h3 class=\"\"><strong style=\"font-weight: 700\">Tactic: Lateral Movement<br><\/strong><\/h3>\n            <\/div>\n          <\/div>\n          <div data-colibri-id=\"190-c96\" class=\"h-text h-text-component style-329 style-local-190-c96 position-relative h-element\">\n            \n            \n            <div class=\"\">\n              <p>&#8220;Lateral Movement&#8221; techniques (\n                <a href=\"https:\/\/attack.mitre.org\/tactics\/TA0008\" target=\"_blank\" class=\"customize-unpreviewable\" rel=\"noopener\">\n                  <u>Lateral Movement [TA0008]<\/u>\n                <\/a>) are those activities conducted by the adversary post-compromise to move within the company network with internal pivoting activities. Typically the criminal&#8217;s goal is to gain access to more critical servers and maintain persistent access\n                to the infrastructure.<span style=\"font-weight: 400;font-size: 18px;font-family: Roboto, RobotoDraft, Helvetica, Arial, sans-serif\"><br><\/span><\/p>\n            <\/div>\n          <\/div>\n          <div data-colibri-id=\"190-c97\" class=\"h-global-transition-all h-heading style-1555 style-local-190-c97 position-relative h-element\">\n            \n            <div class=\"h-heading__outer style-1555 style-local-190-c97\">\n              \n              \n              <h6 class=\"\">Techniques examples:<\/h6>\n            <\/div>\n          <\/div>\n          <div data-colibri-id=\"190-c98\" class=\"h-icon style-332 style-local-190-c98 position-relative h-element\">\n            <span class=\"h-svg-icon h-icon__icon style-332-icon style-local-190-c98-icon\"><!--Icon by Foundation Icons (https:\/\/zurb.com\/playground\/foundation-icon-fonts-3)--><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"ticket\" viewBox=\"0 0 512 512.5\"><path d=\"M509 172.25c4 4 4 9 0 13l-324 324c-4 4-9 4-13 0v-1l-63-62c8-12 7-28-4-39s-27-12-39-4l-63-63c-4-4-4-9 0-13l324-324c4-4 9-4 13 0l63 63c-8 12-7 28 4 39s27 12 39 4l63 63zm-71 13c4-4 4-9 0-13l-98-98c-4-4-9-4-13 0l-253 253c-4 4-4 9 0 13l98 98c4 4 9 4 13 0zm-121 79c1 0 2 1 2 2s-1 2-1 2l-1 1-39 9-9 39c0 1-2 2-3 2s-2-1-2-2l-17-35-36 4c-1 0-3 0-3-1s-1-2 0-3l27-26-17-34c0-1 0-2 1-3s2-1 3-1l34 17 26-27c1-1 2 0 3 0s1 2 1 3l-4 36z\"><\/path><\/svg><\/span><\/div>\n          <div data-colibri-id=\"190-c99\" class=\"h-global-transition-all h-heading style-333 style-local-190-c99 position-relative h-element\">\n            \n            <div class=\"h-heading__outer style-333 style-local-190-c99\">\n              \n              \n              <h5 class=\"\">Pass the hash<\/h5>\n            <\/div>\n        <\/div>\n        <div data-colibri-id=\"190-c100\" class=\"h-text h-text-component style-329 style-local-190-c100 position-relative h-element\">\n          \n          \n          <div class=\"\">\n            <p>Adversaries can use alternative authentication methods, such as password hashes, to move laterally within an environment and bypass normal system access controls.<\/p>\n          <\/div>\n        <\/div>\n        <div data-colibri-id=\"190-c101\" class=\"h-icon style-332 style-local-190-c101 position-relative h-element\">\n          <span class=\"h-svg-icon h-icon__icon style-332-icon style-local-190-c101-icon\"><!--Icon by Material Icons (https:\/\/material.io)--><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"leak_remove\" viewBox=\"0 0 512 512\"><path d=\"M328 247q57-34 120-34v43q-47 0-89 22l-31-31zm97 97l-34-34q27-11 57-11v42q-12 0-23 3zM299 64q0 63-34 120l-31-31q22-42 22-89h43zM64 91l27-27 357 357-27 27-61-61q-19 27-19 61h-42q0-50 31-91l-31-30q-43 53-43 121h-43q0-86 56-152l-53-53q-66 56-152 56v-43q69 0 122-43l-31-31q-41 31-91 31v-42q34 0 61-19L64 91zm149-27q0 30-11 57l-34-34q3-11 3-23h42z\"><\/path><\/svg><\/span><\/div>\n        <div data-colibri-id=\"190-c102\" class=\"h-global-transition-all h-heading style-333 style-local-190-c102 position-relative h-element\">\n          \n          <div class=\"h-heading__outer style-333 style-local-190-c102\">\n            \n            \n            <h5 class=\"\">Remote Services<\/h5>\n          <\/div>\n      <\/div>\n      <div data-colibri-id=\"190-c103\" class=\"h-text h-text-component style-329 style-local-190-c103 position-relative h-element\">\n        \n        \n        <div class=\"\">\n          <p>Adversaries can use Valid Accounts to access a service that accepts remote connections (telnet, SSH and VNC, SMB). The adversary can then perform actions as the logged in user.<\/p>\n        <\/div>\n      <\/div>\n    <\/div>\n  <\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div data-colibri-component=\"section\" data-colibri-id=\"190-c107\" id=\"durante-3\" class=\"h-section h-section-global-spacing d-flex align-items-lg-center align-items-md-center align-items-center style-1560 style-local-190-c107 position-relative\">\n  \n  \n  <div class=\"h-section-grid-container h-section-boxed-container\">\n    \n    <div data-colibri-id=\"190-c108\" class=\"h-row-container gutters-row-lg-1 gutters-row-md-1 gutters-row-0 gutters-row-v-lg-1 gutters-row-v-md-1 gutters-row-v-1 style-1541 style-local-190-c108 position-relative\">\n      \n      <div class=\"h-row justify-content-lg-start justify-content-md-start justify-content-start align-items-lg-stretch align-items-md-stretch align-items-stretch gutters-col-lg-1 gutters-col-md-1 gutters-col-0 gutters-col-v-lg-1 gutters-col-v-md-1 gutters-col-v-1\">\n        \n        <div class=\"h-column h-column-container d-flex h-col-lg-4 h-col-md-4 h-col-12 style-1542-outer style-local-190-c109-outer\">\n          <div data-colibri-id=\"190-c109\" class=\"d-flex h-flex-basis h-column__inner h-px-lg-0 h-px-md-0 h-px-0 v-inner-lg-0 v-inner-md-0 v-inner-0 style-1542 style-local-190-c109 position-relative\">\n            \n            \n            <div class=\"w-100 h-y-container h-column__content h-column__v-align flex-basis-100 align-self-lg-start align-self-md-start align-self-start\">\n              \n              <div data-colibri-id=\"190-c110\" class=\"h-global-transition-all h-heading style-328 style-local-190-c110 position-relative h-element\">\n                \n                <div class=\"h-heading__outer style-328 style-local-190-c110\">\n                  \n                  \n                  <h3 class=\"\"><strong style=\"font-weight: 700\">Tactic:  Collection<br><\/strong><\/h3>\n                <\/div>\n              <\/div>\n              <div data-colibri-id=\"190-c111\" class=\"h-text h-text-component style-329 style-local-190-c111 position-relative h-element\">\n                \n                \n                <div class=\"\">\n                  <p>&#8220;Collection&#8221; techniques (\n                    <a href=\"https:\/\/attack.mitre.org\/tactics\/TA0009\" target=\"_blank\" class=\"customize-unpreviewable\" rel=\"noopener\">\n                      <u>Collection [TA0009]<\/u>\n                    <\/a>) are those activities conducted by the adversary for the collection of information and data. Activities carried out post-compromise to obtain information (passwords, strategic data, etc.).<span style=\"font-weight: 400;font-size: 18px;font-family: Roboto, RobotoDraft, Helvetica, Arial, sans-serif\"><br><\/span><\/p>\n                <\/div>\n              <\/div>\n              <div data-colibri-id=\"190-c112\" class=\"h-global-transition-all h-heading style-1555 style-local-190-c112 position-relative h-element\">\n                \n                <div class=\"h-heading__outer style-1555 style-local-190-c112\">\n                  \n                  \n                  <h6 class=\"\">Techniques examples:<\/h6>\n                <\/div>\n              <\/div>\n              <div data-colibri-id=\"190-c113\" class=\"h-icon style-332 style-local-190-c113 position-relative h-element\">\n                <span class=\"h-svg-icon h-icon__icon style-332-icon style-local-190-c113-icon\"><!--Icon by Material Icons (https:\/\/material.io)--><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"personal_video\" viewBox=\"0 0 512 512\"><path d=\"M448 363V107H64v256h384zm0-299q17 0 30 12.5t13 30.5l-1 256q0 17-12.5 29.5T448 405H341v43H171v-43H64q-18 0-30.5-12.5T21 363V107q0-18 12.5-30.5T64 64h384z\"><\/path><\/svg><\/span><\/div>\n              <div data-colibri-id=\"190-c114\" class=\"h-global-transition-all h-heading style-333 style-local-190-c114 position-relative h-element\">\n                \n                <div class=\"h-heading__outer style-333 style-local-190-c114\">\n                  \n                  \n                  <h5 class=\"\">Screen Capture<\/h5>\n                <\/div>\n            <\/div>\n            <div data-colibri-id=\"190-c115\" class=\"h-text h-text-component style-329 style-local-190-c115 position-relative h-element\">\n              \n              \n              <div class=\"\">\n                <p>Opponents perform Screen Capture to obtain screenshots of the screen. Technique used to spy on the victim&#8217;s operations.<\/p>\n              <\/div>\n            <\/div>\n            <div data-colibri-id=\"190-c116\" class=\"h-icon style-332 style-local-190-c116 position-relative h-element\">\n              <span class=\"h-svg-icon h-icon__icon style-332-icon style-local-190-c116-icon\"><!--Icon by Font Awesome (https:\/\/fontawesome.com)-->\n    <svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"microphone\" viewBox=\"0 0 1246.5988 1896.0833\">\n      <path d=\"M1152 704v128q0 221-147.5 384.5T640 1404v132h256q26 0 45 19t19 45-19 45-45 19H256q-26 0-45-19t-19-45 19-45 45-19h256v-132q-217-24-364.5-187.5T0 832V704q0-26 19-45t45-19 45 19 19 45v128q0 185 131.5 316.5T576 1280t316.5-131.5T1024 832V704q0-26 19-45t45-19 45 19 19 45zM896 320v512q0 132-94 226t-226 94-226-94-94-226V320q0-132 94-226T576 0t226 94 94 226z\"><\/path>\n    <\/svg><\/span><\/div>\n            <div data-colibri-id=\"190-c117\" class=\"h-global-transition-all h-heading style-1553 style-local-190-c117 position-relative h-element\">\n              \n              <div class=\"h-heading__outer style-1553 style-local-190-c117\">\n                \n                \n                <h5 class=\"\">Audio Capture<\/h5>\n              <\/div>\n            <\/div>\n            <div data-colibri-id=\"190-c118\" class=\"h-text h-text-component style-329 style-local-190-c118 position-relative h-element\">\n              \n              \n              <div class=\"\">\n                <p>Adversaries perform audio recording of the victim&#8217;s device to listen to conversations.<\/p>\n              <\/div>\n            <\/div>\n          <\/div>\n        <\/div>\n      <\/div>\n      <div class=\"h-column h-column-container d-flex h-col-lg-4 h-col-md-4 h-col-12 style-1543-outer style-local-190-c119-outer\">\n        <div data-colibri-id=\"190-c119\" class=\"d-flex h-flex-basis h-column__inner h-px-lg-0 h-px-md-0 h-px-0 v-inner-lg-0 v-inner-md-0 v-inner-0 style-1543 style-local-190-c119 position-relative\">\n          \n          \n          <div class=\"w-100 h-y-container h-column__content h-column__v-align flex-basis-100 align-self-lg-start align-self-md-start align-self-start\">\n            \n            <div data-colibri-id=\"190-c120\" class=\"h-text h-text-component style-329 style-local-190-c120 position-relative h-element\">\n              \n              \n              <div class=\"\">\n                <p><span style=\"font-weight: 400;font-size: 18px;font-family: Roboto, RobotoDraft, Helvetica, Arial, sans-serif\"><br><\/span><\/p>\n              <\/div>\n            <\/div>\n          <\/div>\n        <\/div>\n      <\/div>\n      <div class=\"h-column h-column-container d-flex h-col-lg-4 h-col-md-4 h-col-12 style-1548-outer style-local-190-c121-outer\">\n        <div data-colibri-id=\"190-c121\" class=\"d-flex h-flex-basis h-column__inner h-ui-empty-state-container h-px-lg-0 h-px-md-0 h-px-0 v-inner-lg-0 v-inner-md-0 v-inner-0 style-1548 style-local-190-c121 position-relative\">\n          \n          \n          <div class=\"w-100 h-y-container h-column__content h-column__v-align flex-basis-100\">\n            \n          <\/div>\n        <\/div>\n      <\/div>\n    <\/div>\n  <\/div>\n<\/div>\n<\/div>\n<div data-colibri-component=\"section\" data-colibri-id=\"190-c125\" id=\"fase-finale\" class=\"h-section h-section-global-spacing d-flex align-items-lg-center align-items-md-center align-items-center style-1561 style-local-190-c125 position-relative\">\n  \n  \n  <div class=\"h-section-grid-container h-section-boxed-container\">\n    <div data-colibri-id=\"190-c157\" class=\"h-row-container gutters-row-lg-2 gutters-row-md-2 gutters-row-0 gutters-row-v-lg-2 gutters-row-v-md-2 gutters-row-v-2 style-1544 style-local-190-c157 position-relative\">\n      \n      <div class=\"h-row justify-content-lg-center justify-content-md-center justify-content-center align-items-lg-stretch align-items-md-stretch align-items-stretch gutters-col-lg-2 gutters-col-md-2 gutters-col-0 gutters-col-v-lg-2 gutters-col-v-md-2 gutters-col-v-2\">\n        \n        <div class=\"h-column h-column-container d-flex h-col-lg-12 h-col-md-12 h-col-12 style-1545-outer style-local-190-c158-outer\">\n          <div data-colibri-id=\"190-c158\" class=\"d-flex h-flex-basis h-column__inner h-px-lg-2 h-px-md-2 h-px-2 v-inner-lg-2 v-inner-md-2 v-inner-2 style-1545 style-local-190-c158 position-relative\">\n            \n            \n            <div class=\"w-100 h-y-container h-column__content h-column__v-align flex-basis-100 align-self-lg-start align-self-md-start align-self-start\">\n              \n              <div data-colibri-id=\"190-c159\" class=\"h-global-transition-all h-heading style-1546 style-local-190-c159 position-relative h-element\">\n                \n                <div class=\"h-heading__outer style-1546 style-local-190-c159\">\n                  \n                  \n                  <h1 class=\"\">Final Stage<\/h1>\n                <\/div>\n              <\/div>\n            <\/div>\n          <\/div>\n        <\/div>\n      <\/div>\n    <\/div>\n    <div data-colibri-id=\"190-c126\" class=\"h-row-container gutters-row-lg-1 gutters-row-md-1 gutters-row-0 gutters-row-v-lg-1 gutters-row-v-md-1 gutters-row-v-1 style-1541 style-local-190-c126 position-relative\">\n      \n      <div class=\"h-row justify-content-lg-start justify-content-md-start justify-content-start align-items-lg-stretch align-items-md-stretch align-items-stretch gutters-col-lg-1 gutters-col-md-1 gutters-col-0 gutters-col-v-lg-1 gutters-col-v-md-1 gutters-col-v-1\">\n        \n        <div class=\"h-column h-column-container d-flex h-col-lg-4 h-col-md-4 h-col-12 style-1542-outer style-local-190-c127-outer\">\n          <div data-colibri-id=\"190-c127\" class=\"d-flex h-flex-basis h-column__inner h-px-lg-0 h-px-md-0 h-px-0 v-inner-lg-0 v-inner-md-0 v-inner-0 style-1542 style-local-190-c127 position-relative\">\n            \n            \n            <div class=\"w-100 h-y-container h-column__content h-column__v-align flex-basis-100 align-self-lg-start align-self-md-start align-self-start\">\n              \n              <div data-colibri-id=\"190-c128\" class=\"h-global-transition-all h-heading style-328 style-local-190-c128 position-relative h-element\">\n                \n                <div class=\"h-heading__outer style-328 style-local-190-c128\">\n                  \n                  \n                  <h3 class=\"\"><strong style=\"font-weight: 700\">Tactic: Command &amp; Control<br><\/strong><\/h3>\n                <\/div>\n              <\/div>\n              <div data-colibri-id=\"190-c129\" class=\"h-text h-text-component style-329 style-local-190-c129 position-relative h-element\">\n                \n                \n                <div class=\"\">\n                  <p>&#8220;Command &amp; Control&#8221; techniques (\n                    <a href=\"https:\/\/attack.mitre.org\/tactics\/TA0011\" target=\"_blank\" class=\"customize-unpreviewable\" rel=\"noopener\">\n                      <u>Command &amp; Control [TA0011]<\/u>\n                    <\/a>) concern the communication methods implemented by the adversary for remote control of the compromised system. In this way the adversary transmits commands to the victim system.<\/p>\n                <\/div>\n              <\/div>\n              <div data-colibri-id=\"190-c130\" class=\"h-global-transition-all h-heading style-1555 style-local-190-c130 position-relative h-element\">\n                \n                <div class=\"h-heading__outer style-1555 style-local-190-c130\">\n                  \n                  \n                  <h6 class=\"\">Techniques examples:<\/h6>\n                <\/div>\n              <\/div>\n              <div data-colibri-id=\"190-c131\" class=\"h-icon style-332 style-local-190-c131 position-relative h-element\">\n                <span class=\"h-svg-icon h-icon__icon style-332-icon style-local-190-c131-icon\"><!--Icon by Ionicons (https:\/\/ionicons.com)--><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"arrow-swap\" viewBox=\"0 0 384 512\"><path d=\"M0 328c0-4 4-8 8-8h248v-64l128 96-128 96v-64H8c-4 0-8-4-8-8v-48zm384-144c0 4-4 8-8 8H128v64L0 160l128-96v64h248c4 0 8 4 8 8v48z\"><\/path><\/svg><\/span><\/div>\n              <div data-colibri-id=\"190-c132\" class=\"h-global-transition-all h-heading style-333 style-local-190-c132 position-relative h-element\">\n                \n                <div class=\"h-heading__outer style-333 style-local-190-c132\">\n                  \n                  \n                  <h5 class=\"\">Remote Access Software<\/h5>\n                <\/div>\n            <\/div>\n            <div data-colibri-id=\"190-c133\" class=\"h-text h-text-component style-329 style-local-190-c133 position-relative h-element\">\n              \n              \n              <div class=\"\">\n                <p>Adversaries exploit legitimate third-party software for remote access (Team Viewer, LogMeIn, AmmyyAdmin, etc.).<\/p>\n              <\/div>\n            <\/div>\n            <div data-colibri-id=\"190-c134\" class=\"h-icon style-332 style-local-190-c134 position-relative h-element\">\n              <span class=\"h-svg-icon h-icon__icon style-332-icon style-local-190-c134-icon\"><!--Icon by Material Icons (https:\/\/material.io)--><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"leak_remove\" viewBox=\"0 0 512 512\"><path d=\"M328 247q57-34 120-34v43q-47 0-89 22l-31-31zm97 97l-34-34q27-11 57-11v42q-12 0-23 3zM299 64q0 63-34 120l-31-31q22-42 22-89h43zM64 91l27-27 357 357-27 27-61-61q-19 27-19 61h-42q0-50 31-91l-31-30q-43 53-43 121h-43q0-86 56-152l-53-53q-66 56-152 56v-43q69 0 122-43l-31-31q-41 31-91 31v-42q34 0 61-19L64 91zm149-27q0 30-11 57l-34-34q3-11 3-23h42z\"><\/path><\/svg><\/span><\/div>\n            <div data-colibri-id=\"190-c135\" class=\"h-global-transition-all h-heading style-1553 style-local-190-c135 position-relative h-element\">\n              \n              <div class=\"h-heading__outer style-1553 style-local-190-c135\">\n                \n                \n                <h5 class=\"\">Application Protocl<\/h5>\n              <\/div>\n          <\/div>\n          <div data-colibri-id=\"190-c136\" class=\"h-text h-text-component style-329 style-local-190-c136 position-relative h-element\">\n            \n            \n            <div class=\"\">\n              <p>Adversaries use application protocols for transmitting commands to the victim system such as Web, MAIL, and DNS protocols.<\/p>\n            <\/div>\n          <\/div>\n        <\/div>\n      <\/div>\n    <\/div>\n    <div class=\"h-column h-column-container d-flex h-col-lg-4 h-col-md-4 h-col-12 style-1543-outer style-local-190-c137-outer\">\n      <div data-colibri-id=\"190-c137\" class=\"d-flex h-flex-basis h-column__inner h-px-lg-0 h-px-md-0 h-px-0 v-inner-lg-0 v-inner-md-0 v-inner-0 style-1543 style-local-190-c137 position-relative\">\n        \n        \n        <div class=\"w-100 h-y-container h-column__content h-column__v-align flex-basis-100 align-self-lg-start align-self-md-start align-self-start\">\n          \n          <div data-colibri-id=\"190-c138\" class=\"h-global-transition-all h-heading style-328 style-local-190-c138 position-relative h-element\">\n            \n            <div class=\"h-heading__outer style-328 style-local-190-c138\">\n              \n              \n              <h3 class=\"\"><strong style=\"font-weight: 700\">Tactic: Exfiltration<br><\/strong><\/h3>\n            <\/div>\n          <\/div>\n          <div data-colibri-id=\"190-c139\" class=\"h-text h-text-component style-329 style-local-190-c139 position-relative h-element\">\n            \n            \n            <div class=\"\">\n              <p>&#8220;Exfiltration&#8221; techniques (\n                <a href=\"https:\/\/attack.mitre.org\/tactics\/TA0010\" target=\"_blank\" class=\"customize-unpreviewable\" rel=\"noopener\">\n                  <u>Exfiltration [TA0010]<\/u>\n                <\/a>) are those activities conducted by the adversary to extract data or information from the victim system.<\/p>\n              <p>Exfiltration consists of techniques that adversaries can use to steal data from the network. Techniques for extracting data from a target network include transfer through the command and control channel.<span style=\"font-weight: 400;font-size: 18px;font-family: Roboto, RobotoDraft, Helvetica, Arial, sans-serif\"><br><\/span><\/p>\n            <\/div>\n          <\/div>\n          <div data-colibri-id=\"190-c140\" class=\"h-global-transition-all h-heading style-1558 style-local-190-c140 position-relative h-element\">\n            \n            <div class=\"h-heading__outer style-1558 style-local-190-c140\">\n              \n              \n              <h6 class=\"\">Techniques examples:<\/h6>\n            <\/div>\n          <\/div>\n          <div data-colibri-id=\"190-c141\" class=\"h-icon style-332 style-local-190-c141 position-relative h-element\">\n            <span class=\"h-svg-icon h-icon__icon style-332-icon style-local-190-c141-icon\"><!--Icon by Foundation Icons (https:\/\/zurb.com\/playground\/foundation-icon-fonts-3)--><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"comment-minus\" viewBox=\"0 0 470 512.5\"><path d=\"M302 282.25h92v93c-2 8-9 14-17 14H152l-44 44c-3 5-9 8-15 8-10 0-17-7-17-17v-35H17c-8 0-15-6-17-14v-288c1-9 8-16 17-16h360c9 0 16 7 17 16v91h-92c-5 0-9 4-9 9v86c0 5 4 9 9 9zm159-79c5 0 9 4 9 9v36c0 5-4 8-9 8H328c-5 0-9-3-9-8v-36c0-5 4-9 9-9h133z\"><\/path><\/svg><\/span><\/div>\n          <div data-colibri-id=\"190-c142\" class=\"h-global-transition-all h-heading style-345 style-local-190-c142 position-relative h-element\">\n            \n            <div class=\"h-heading__outer style-345 style-local-190-c142\">\n              \n              \n              <h5 class=\"\">Exfiltration trough C2<\/h5>\n            <\/div>\n        <\/div>\n        <div data-colibri-id=\"190-c143\" class=\"h-text h-text-component style-329 style-local-190-c143 position-relative h-element\">\n          \n          \n          <div class=\"\">\n            <p>Adversaries exfiltrate information using the same communication channel used to send commands to the system (Command and Control).<\/p>\n          <\/div>\n        <\/div>\n        <div data-colibri-id=\"190-c144\" class=\"h-icon style-332 style-local-190-c144 position-relative h-element\">\n          <span class=\"h-svg-icon h-icon__icon style-332-icon style-local-190-c144-icon\"><!--Icon by Font Awesome (https:\/\/fontawesome.com)-->\n    <svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"microphone\" viewBox=\"0 0 1246.5988 1896.0833\">\n      <path d=\"M1152 704v128q0 221-147.5 384.5T640 1404v132h256q26 0 45 19t19 45-19 45-45 19H256q-26 0-45-19t-19-45 19-45 45-19h256v-132q-217-24-364.5-187.5T0 832V704q0-26 19-45t45-19 45 19 19 45v128q0 185 131.5 316.5T576 1280t316.5-131.5T1024 832V704q0-26 19-45t45-19 45 19 19 45zM896 320v512q0 132-94 226t-226 94-226-94-94-226V320q0-132 94-226T576 0t226 94 94 226z\"><\/path>\n    <\/svg><\/span><\/div>\n        <div data-colibri-id=\"190-c145\" class=\"h-global-transition-all h-heading style-345 style-local-190-c145 position-relative h-element\">\n          \n          <div class=\"h-heading__outer style-345 style-local-190-c145\">\n            \n            \n            <h5 class=\"\">Exfiltration trough cloud account<\/h5>\n          <\/div>\n        <\/div>\n        <div data-colibri-id=\"190-c146\" class=\"h-text h-text-component style-329 style-local-190-c146 position-relative h-element\">\n          \n          \n          <div class=\"\">\n            <p>Adversaries exfiltrate data through the use of cloud accounts and services.<\/p>\n          <\/div>\n        <\/div>\n      <\/div>\n    <\/div>\n  <\/div>\n  <div class=\"h-column h-column-container d-flex h-col-lg-4 h-col-md-4 h-col-12 style-1548-outer style-local-190-c147-outer\">\n    <div data-colibri-id=\"190-c147\" class=\"d-flex h-flex-basis h-column__inner h-px-lg-0 h-px-md-0 h-px-0 v-inner-lg-0 v-inner-md-0 v-inner-0 style-1548 style-local-190-c147 position-relative\">\n      \n      \n      <div class=\"w-100 h-y-container h-column__content h-column__v-align flex-basis-100 align-self-lg-start align-self-md-start align-self-start\">\n        \n        <div data-colibri-id=\"190-c148\" class=\"h-global-transition-all h-heading style-328 style-local-190-c148 position-relative h-element\">\n          \n          <div class=\"h-heading__outer style-328 style-local-190-c148\">\n            \n            \n            <h3 class=\"\"><strong style=\"font-weight: 700\">Tactic: Impact<br><\/strong><\/h3>\n          <\/div>\n        <\/div>\n        <div data-colibri-id=\"190-c149\" class=\"h-text h-text-component style-329 style-local-190-c149 position-relative h-element\">\n          \n          \n          <div class=\"\">\n            <p>&#8220;Impact&#8221; techniques (\n              <a href=\"https:\/\/attack.mitre.org\/tactics\/TA0040\" target=\"_blank\" class=\"customize-unpreviewable\" rel=\"noopener\">\n                <u>Impact [TA0040]<\/u>\n              <\/a>) are those activities carried out by adversaries to manipulate, interrupt or destroy systems or data (as in the Ransomware case).<\/p>\n          <\/div>\n        <\/div>\n        <div data-colibri-id=\"190-c150\" class=\"h-global-transition-all h-heading style-1559 style-local-190-c150 position-relative h-element\">\n          \n          <div class=\"h-heading__outer style-1559 style-local-190-c150\">\n            \n            \n            <h6 class=\"\">Techniques examples:<\/h6>\n          <\/div>\n        <\/div>\n        <div data-colibri-id=\"190-c151\" class=\"h-icon style-332 style-local-190-c151 position-relative h-element\">\n          <span class=\"h-svg-icon h-icon__icon style-332-icon style-local-190-c151-icon\"><!--Icon by Material Icons (https:\/\/material.io)--><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"description\" viewBox=\"0 0 512 512\"><path d=\"M277 192h118L277 75v117zm64 107v-43H171v43h170zm0 85v-43H171v43h170zM299 43l128 128v256q0 17-13 29.5T384 469H128q-17 0-30-12.5T85 427l1-342q0-17 12.5-29.5T128 43h171z\"><\/path><\/svg><\/span><\/div>\n        <div data-colibri-id=\"190-c152\" class=\"h-global-transition-all h-heading style-333 style-local-190-c152 position-relative h-element\">\n          \n          <div class=\"h-heading__outer style-333 style-local-190-c152\">\n            \n            \n            <h5 class=\"\">Data Encryption<\/h5>\n          <\/div>\n      <\/div>\n      <div data-colibri-id=\"190-c153\" class=\"h-text h-text-component style-329 style-local-190-c153 position-relative h-element\">\n        \n        \n        <div class=\"\">\n          <p>Adversaries can encrypt data on target systems to disrupt the availability of system and network resources.<\/p>\n        <\/div>\n      <\/div>\n      <div data-colibri-id=\"190-c154\" class=\"h-icon style-332 style-local-190-c154 position-relative h-element\">\n        <span class=\"h-svg-icon h-icon__icon style-332-icon style-local-190-c154-icon\"><!--Icon by Material Icons (https:\/\/material.io)--><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"leak_remove\" viewBox=\"0 0 512 512\"><path d=\"M328 247q57-34 120-34v43q-47 0-89 22l-31-31zm97 97l-34-34q27-11 57-11v42q-12 0-23 3zM299 64q0 63-34 120l-31-31q22-42 22-89h43zM64 91l27-27 357 357-27 27-61-61q-19 27-19 61h-42q0-50 31-91l-31-30q-43 53-43 121h-43q0-86 56-152l-53-53q-66 56-152 56v-43q69 0 122-43l-31-31q-41 31-91 31v-42q34 0 61-19L64 91zm149-27q0 30-11 57l-34-34q3-11 3-23h42z\"><\/path><\/svg><\/span><\/div>\n      <div data-colibri-id=\"190-c155\" class=\"h-global-transition-all h-heading style-333 style-local-190-c155 position-relative h-element\">\n        \n        <div class=\"h-heading__outer style-333 style-local-190-c155\">\n          \n          \n          <h5 class=\"\">Defacement<\/h5>\n        <\/div>\n    <\/div>\n    <div data-colibri-id=\"190-c156\" class=\"h-text h-text-component style-329 style-local-190-c156 position-relative h-element\">\n      \n      \n      <div class=\"\">\n        <p>Adversaries can modify the visual content available internally or externally to a corporate network (typically websites and hacktivism).<\/p>\n      <\/div>\n    <\/div>\n  <\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Pre-Attack Tactic: Reconnaissance Recoinnassance techniques ( Reconnaissance&nbsp; [TA0443]) are those activities conducted by the adversary to obtain information with the aim of planning a cyber attack. Techniques examples: Network Scanning Obtain information on the company perimeter Tactic: Initial Access &#8220;Initial Access&#8221; techniques ( Initial Access&nbsp;[TA0001] ) consist of activities conducted by criminals to access the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2207,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/homepage.php","meta":{"footnotes":""},"class_list":["post-190","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Fortgale - Portale Minacce e strumenti Offensivi<\/title>\n<meta name=\"description\" content=\"Dettagli sui Malware, Tattiche e Tecniche e strumenti utilizzati dai criminali per la compromissione di sistemi e infrastrutture.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fortgale - Portale Minacce e strumenti Offensivi\" \/>\n<meta property=\"og:description\" content=\"Informazioni tecniche relative a Malware, Ransomware, strumenti offensivi e tecniche di compromissione.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fortgale.com\/threats\/\" \/>\n<meta property=\"og:site_name\" content=\"Fortgale and Cyber Threats\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-03T11:04:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/fortgale.com\/threats\/wp-content\/uploads\/sites\/3\/2022\/05\/Fortgale-Threats.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Fortgale - Portale Minacce e strumenti Offensivi\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/fortgale.com\\\/threats\\\/\",\"url\":\"https:\\\/\\\/fortgale.com\\\/threats\\\/\",\"name\":\"Fortgale - Portale Minacce e strumenti Offensivi\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fortgale.com\\\/threats\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/fortgale.com\\\/threats\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/fortgale.com\\\/threats\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/fortgale.com\\\/threats\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2022\\\/05\\\/Fortgale-Threats.png\",\"datePublished\":\"2022-03-17T12:05:23+00:00\",\"dateModified\":\"2024-01-03T11:04:24+00:00\",\"description\":\"Dettagli sui Malware, Tattiche e Tecniche e strumenti utilizzati dai criminali per la compromissione di sistemi e infrastrutture.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/fortgale.com\\\/threats\\\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/fortgale.com\\\/threats\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/fortgale.com\\\/threats\\\/#primaryimage\",\"url\":\"https:\\\/\\\/fortgale.com\\\/threats\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2022\\\/05\\\/Fortgale-Threats.png\",\"contentUrl\":\"https:\\\/\\\/fortgale.com\\\/threats\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2022\\\/05\\\/Fortgale-Threats.png\",\"width\":1920,\"height\":1080,\"caption\":\"Fortgale Background\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/fortgale.com\\\/threats\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/fortgale.com\\\/threats\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Home\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/fortgale.com\\\/threats\\\/#website\",\"url\":\"https:\\\/\\\/fortgale.com\\\/threats\\\/\",\"name\":\"Fortgale and Cyber Threats\",\"description\":\"Fortgale Threats, ATT&amp;CK, Malware...\",\"publisher\":{\"@id\":\"https:\\\/\\\/fortgale.com\\\/threats\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/fortgale.com\\\/threats\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/fortgale.com\\\/threats\\\/#organization\",\"name\":\"Fortgale\",\"url\":\"https:\\\/\\\/fortgale.com\\\/threats\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/fortgale.com\\\/threats\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/fortgale.com\\\/threats\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2022\\\/04\\\/logo_blu.png\",\"contentUrl\":\"https:\\\/\\\/fortgale.com\\\/threats\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2022\\\/04\\\/logo_blu.png\",\"width\":558,\"height\":125,\"caption\":\"Fortgale\"},\"image\":{\"@id\":\"https:\\\/\\\/fortgale.com\\\/threats\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Fortgale - Portale Minacce e strumenti Offensivi","description":"Dettagli sui Malware, Tattiche e Tecniche e strumenti utilizzati dai criminali per la compromissione di sistemi e infrastrutture.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"it_IT","og_type":"article","og_title":"Fortgale - Portale Minacce e strumenti Offensivi","og_description":"Informazioni tecniche relative a Malware, Ransomware, strumenti offensivi e tecniche di compromissione.","og_url":"https:\/\/fortgale.com\/threats\/","og_site_name":"Fortgale and Cyber Threats","article_modified_time":"2024-01-03T11:04:24+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/fortgale.com\/threats\/wp-content\/uploads\/sites\/3\/2022\/05\/Fortgale-Threats.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_title":"Fortgale - Portale Minacce e strumenti Offensivi","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/fortgale.com\/threats\/","url":"https:\/\/fortgale.com\/threats\/","name":"Fortgale - Portale Minacce e strumenti Offensivi","isPartOf":{"@id":"https:\/\/fortgale.com\/threats\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fortgale.com\/threats\/#primaryimage"},"image":{"@id":"https:\/\/fortgale.com\/threats\/#primaryimage"},"thumbnailUrl":"https:\/\/fortgale.com\/threats\/wp-content\/uploads\/sites\/3\/2022\/05\/Fortgale-Threats.png","datePublished":"2022-03-17T12:05:23+00:00","dateModified":"2024-01-03T11:04:24+00:00","description":"Dettagli sui Malware, Tattiche e Tecniche e strumenti utilizzati dai criminali per la compromissione di sistemi e infrastrutture.","breadcrumb":{"@id":"https:\/\/fortgale.com\/threats\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fortgale.com\/threats\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/fortgale.com\/threats\/#primaryimage","url":"https:\/\/fortgale.com\/threats\/wp-content\/uploads\/sites\/3\/2022\/05\/Fortgale-Threats.png","contentUrl":"https:\/\/fortgale.com\/threats\/wp-content\/uploads\/sites\/3\/2022\/05\/Fortgale-Threats.png","width":1920,"height":1080,"caption":"Fortgale Background"},{"@type":"BreadcrumbList","@id":"https:\/\/fortgale.com\/threats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/fortgale.com\/threats\/"},{"@type":"ListItem","position":2,"name":"Home"}]},{"@type":"WebSite","@id":"https:\/\/fortgale.com\/threats\/#website","url":"https:\/\/fortgale.com\/threats\/","name":"Fortgale and Cyber Threats","description":"Fortgale Threats, ATT&amp;CK, Malware...","publisher":{"@id":"https:\/\/fortgale.com\/threats\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fortgale.com\/threats\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/fortgale.com\/threats\/#organization","name":"Fortgale","url":"https:\/\/fortgale.com\/threats\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/fortgale.com\/threats\/#\/schema\/logo\/image\/","url":"https:\/\/fortgale.com\/threats\/wp-content\/uploads\/sites\/3\/2022\/04\/logo_blu.png","contentUrl":"https:\/\/fortgale.com\/threats\/wp-content\/uploads\/sites\/3\/2022\/04\/logo_blu.png","width":558,"height":125,"caption":"Fortgale"},"image":{"@id":"https:\/\/fortgale.com\/threats\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/fortgale.com\/threats\/wp-json\/wp\/v2\/pages\/190","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fortgale.com\/threats\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/fortgale.com\/threats\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/fortgale.com\/threats\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/fortgale.com\/threats\/wp-json\/wp\/v2\/comments?post=190"}],"version-history":[{"count":20,"href":"https:\/\/fortgale.com\/threats\/wp-json\/wp\/v2\/pages\/190\/revisions"}],"predecessor-version":[{"id":3399,"href":"https:\/\/fortgale.com\/threats\/wp-json\/wp\/v2\/pages\/190\/revisions\/3399"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fortgale.com\/threats\/wp-json\/wp\/v2\/media\/2207"}],"wp:attachment":[{"href":"https:\/\/fortgale.com\/threats\/wp-json\/wp\/v2\/media?parent=190"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}