Attacker Tools On Endpoint
Match Legitimate Name or Location, Masquerading, OS Credential Dumping, Active Scanning
Match Legitimate Name or Location, Masquerading, OS Credential Dumping, Active Scanning
Phishing
Phishing
Ingress Tool Transfer
Disable or Modify Tools, Impair Defenses