## How it works Management ser ...... Account Management * JumpCloud
## How it works Analysis of se ...... about trusting the connection
## How it works Network protoc ...... h inventory management systems
## How it works Application co ...... for potential vulnerabilities.
## Technique Overview Exploit ...... er to craft a working exploit.
## How it works Applications c ...... dows Credential Management API
## How it works Authentication ...... ert threshold will not be met.
## How it works Authorization ...... ert threshold will not be met.
## How it works Software Defin ...... e and networking requirements.
## How it works Bytes are ana ...... r volume of bytes transmitted.
## How it works Certificate An ...... ervices to become unavailable.
## How it works Pinning allows ...... and the EXPECT-CT HTTP header.
## How it works Profiling requ ...... ich may cause false positives.
## How it works Decoy honeypot ...... pecific known vulnerabilities.
## How it works Connection Att ...... both IPv6 and IPv4 addresses.
## How it works #### Memory C ...... -mimikatz-attacks-ed283e7ebdd5
## How it works Rules are impl ...... result in DNS network traffic.
## How it works This technique ...... ld not catch such an incident.
## How it works Some implemen ...... ing application functionality.
## How it works Dead code is ...... nditions for unreachable code.
## Technique Overview Systems ...... attack against other systems.
## How it works The decoy file ...... y accesses to the decoy files.
## How it works Decoy network ...... unauthorized network activity.
## Technique Overview Decoy ob ...... attack against other systems.
## How it works A false online ...... not become stale and outdated.
## How it works Publicly relea ...... e likely to gather information
## How it works Usage of decoy ...... ic the production environment.
## How it works A detection an ...... utilize the decoy credentials.
## How it works This technique ...... lax or have ulterior motives.
## How it works Analyzing the ...... ox](https://cuckoosandbox.org)
## How it works Endpoints are ...... er the machine is compromised.
## How It Works When a process ...... er in the unprotected modules.
## How it works This techniqu ...... g or scientific organizations.
## How it works #### Criteria ...... for restricting applications.
## How it works File modifying ...... rent from authorized activity.
## Technique Overview Some tec ...... h as a sandbox or live system.
## How it works Protocol strea ...... n be exploited by adversaries.
## How it works Rules, often c ...... lementations * YARA * ClamAV
## How it Works Files are encr ...... keys between multiple devices.
## How it works This technique ...... r very large numbers of files.
## How it works Firmware behav ...... n and may require some tuning.
## How it works Firmware in de ...... may introduce additional risk.
## How it works Cryptographic ...... ecomputed firmware hash values
## How it works Policies are ...... p up to date as updates occur.
## How it works Process isolat ...... /O (Intel VT-d) * Firecracker
## How it works This technique ...... to ensure lists are not stale.
## How it works Homoglyph dom ...... to ensure lists are not stale.
## How it works A homoglyph, i ...... result in many false positives
## How It works Software-base ...... les will need to be maintained
## How it works Inter process ...... anted by the operating system.