Permalink
Find file Copy path
Fetching contributors…
Cannot retrieve contributors at this time
49 lines (48 sloc) 1.45 KB
{
"namespace": "access-method",
"description": "The access method used to remotely access a system.",
"version": 1,
"expanded": "Access method",
"predicates": [
{
"value": "brute-force",
"expanded": "Brute force",
"description": "Access was gained through systematic trial of credentials in bulk."
},
{
"value": "password-guessing",
"expanded": "Password guessing",
"description": "Access was gained through guessing passwords through trial and error."
},
{
"value": "remote-desktop-application",
"expanded": "Remote desktop application",
"description": "Access was gained through an application designed for remote access."
},
{
"value": "stolen-credentials",
"expanded": "Stolen credentials",
"description": "Access was gained with stolen credentials."
},
{
"value": "pass-the-hash",
"expanded": "Pass the hash",
"description": "Access was gained through use of an existing known hash."
},
{
"value": "default-credentials",
"expanded": "Default credentials",
"description": "Access was gained through use of the system's default credentials."
},
{
"value": "shell",
"expanded": "Shell",
"description": "Access was gained through the use of a shell."
},
{
"value": "other",
"expanded": "Other",
"description": "Access was gained through another method."
}
]
}