0% found this document useful (0 votes)
56 views1 page

Cybersecurity Tools and Techniques Guide

The document lists various cybersecurity tools, techniques, and concepts along with their associated scores, likely indicating their relevance or effectiveness. It includes references to MITRE ATT&CK, malware investigation, and various network tools such as Netcat and Nmap. The entries cover a wide range of topics from password attacks to privilege escalation methods.

Uploaded by

aaj.tiss
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
56 views1 page

Cybersecurity Tools and Techniques Guide

The document lists various cybersecurity tools, techniques, and concepts along with their associated scores, likely indicating their relevance or effectiveness. It includes references to MITRE ATT&CK, malware investigation, and various network tools such as Netcat and Nmap. The entries cover a wide range of topics from password attacks to privilege escalation methods.

Uploaded by

aaj.tiss
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

5.12 InstallUtil 2.6-2.

8 MITRE ATT&CK
4.91 Instance Meta Data Service Access 3.94 mkfifo-netcat
4.84 Instance Meta Data Service Access(IMDS) 4.23 Modbus
5.7 Iron Python 4.59 ModSecurity
1.1O8 Iterative Prompting 5.43 MOF (Managed Object File format
4.59 joi 1.92 Monitoring Environment
2.5O JQ and JSON 3.25 MS 365 IR
5.49 Kerbrose ticket password change 3.16 MS365 Authentication API
3.32 LANMAN Hashes 5.73 MS365 Compliance
1.6O Legacy Command 3.13 MS365 Password Attacks
3.41 Linux and Unix Password 3.18 MSOLSpray
5.11 Living of the land (LoL) 4.27 MsVenom
5.14 Living Off the Land: Priv. Escalation-Linux 1.1O3 MTTR
1.1O4 LLM 2.16 NCSA
5.35 LLMNR Disable 2.69 [Link]-smb
5.31 LLMNR(Link Local Multicast Name Resolution)3.85 Netcat
5.11 LOLBAS 3.9O Netcat Backdoor
2.88 Long PowerShell CommandLine 3.86 Netcat Client Mode
1.42 LSASS 3.88 Netcat Data Transfer
4.97 Lyft SSRF 3.87 Netcat Listen Mode
5.26 Machine-in-the-middle (MITM) 3.91 Netcat Persistent
4.22 Macros 3.89 Netcat Port Scanning
1.89 Malware Investigation 3.94 Netcat Relay on linux
4.5 Metasploit Arsenal (Modules) 3.93 Netcat Relays
4.8 Metasploit Payloads 3.88 Netcat Uses
4.8 Meterpreter 3.85 Netcat-connection broker
4.9- 2.7O NetShareEnum-smb
4.10 Meterpreter features 3.95 Network Defense
5.21 Meterpreter pivoting 3.79 Network Logs-Cloud
5.22 Meterpreter route pivoting 1.46 Network Usage
4.7 Metsploit Exploits-2000 1.67 Nework investigation
4.4 Metsploit Framework 2.36 nmap
3.23 MFA bypass -Microsoft 365 2.38 nmap - host discover
3.64 MFA -deploy for passwords 2.14 nmap for DNS
3.23 MFA sweep 2.44 Nmap NSE Scripts
3.23 Microsoft Conditional Access(CA) 2.41 nmap scan types
4.25 Microsoft Diagnostic Tool(MSDT) 3.25 No E5 License
4.25 Microsoft Vulnerability 3.61 NoLMHash
1.33 Mimecast breach 2.12 nslookup
114.00 mimikatz 3.33 NT Hashes
3.38 Mimikatz 3.36 [Link]
5.9 Mimikatz-windows passwords 5.7 Obfuscation

You might also like