com.pulumi.azurenative.security.enums.Techniques Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of azure-native Show documentation
Show all versions of azure-native Show documentation
A native Pulumi package for creating and managing Azure resources.
// *** WARNING: this file was generated by pulumi-java-gen. ***
// *** Do not edit by hand unless you're certain you know what you are doing! ***
package com.pulumi.azurenative.security.enums;
import com.pulumi.core.annotations.EnumType;
import java.lang.String;
import java.util.Objects;
import java.util.StringJoiner;
/**
* Techniques of the assessment
*
*/
@EnumType
public enum Techniques {
Abuse_Elevation_Control_Mechanism("Abuse Elevation Control Mechanism"),
Access_Token_Manipulation("Access Token Manipulation"),
Account_Discovery("Account Discovery"),
Account_Manipulation("Account Manipulation"),
Active_Scanning("Active Scanning"),
Application_Layer_Protocol("Application Layer Protocol"),
Audio_Capture("Audio Capture"),
Boot_or_Logon_Autostart_Execution("Boot or Logon Autostart Execution"),
Boot_or_Logon_Initialization_Scripts("Boot or Logon Initialization Scripts"),
Brute_Force("Brute Force"),
Cloud_Infrastructure_Discovery("Cloud Infrastructure Discovery"),
Cloud_Service_Dashboard("Cloud Service Dashboard"),
Cloud_Service_Discovery("Cloud Service Discovery"),
Command_and_Scripting_Interpreter("Command and Scripting Interpreter"),
Compromise_Client_Software_Binary("Compromise Client Software Binary"),
Compromise_Infrastructure("Compromise Infrastructure"),
Container_and_Resource_Discovery("Container and Resource Discovery"),
Create_Account("Create Account"),
Create_or_Modify_System_Process("Create or Modify System Process"),
Credentials_from_Password_Stores("Credentials from Password Stores"),
Data_Destruction("Data Destruction"),
Data_Encrypted_for_Impact("Data Encrypted for Impact"),
Data_from_Cloud_Storage_Object("Data from Cloud Storage Object"),
Data_from_Configuration_Repository("Data from Configuration Repository"),
Data_from_Information_Repositories("Data from Information Repositories"),
Data_from_Local_System("Data from Local System"),
Data_Manipulation("Data Manipulation"),
Data_Staged("Data Staged"),
Defacement("Defacement"),
Deobfuscate_Decode_Files_or_Information("Deobfuscate/Decode Files or Information"),
Disk_Wipe("Disk Wipe"),
Domain_Trust_Discovery("Domain Trust Discovery"),
Driveby_Compromise("Drive-by Compromise"),
Dynamic_Resolution("Dynamic Resolution"),
Endpoint_Denial_of_Service("Endpoint Denial of Service"),
Event_Triggered_Execution("Event Triggered Execution"),
Exfiltration_Over_Alternative_Protocol("Exfiltration Over Alternative Protocol"),
Exploit_PublicFacing_Application("Exploit Public-Facing Application"),
Exploitation_for_Client_Execution("Exploitation for Client Execution"),
Exploitation_for_Credential_Access("Exploitation for Credential Access"),
Exploitation_for_Defense_Evasion("Exploitation for Defense Evasion"),
Exploitation_for_Privilege_Escalation("Exploitation for Privilege Escalation"),
Exploitation_of_Remote_Services("Exploitation of Remote Services"),
External_Remote_Services("External Remote Services"),
Fallback_Channels("Fallback Channels"),
File_and_Directory_Discovery("File and Directory Discovery"),
Gather_Victim_Network_Information("Gather Victim Network Information"),
Hide_Artifacts("Hide Artifacts"),
Hijack_Execution_Flow("Hijack Execution Flow"),
Impair_Defenses("Impair Defenses"),
Implant_Container_Image("Implant Container Image"),
Indicator_Removal_on_Host("Indicator Removal on Host"),
Indirect_Command_Execution("Indirect Command Execution"),
Ingress_Tool_Transfer("Ingress Tool Transfer"),
Input_Capture("Input Capture"),
InterProcess_Communication("Inter-Process Communication"),
Lateral_Tool_Transfer("Lateral Tool Transfer"),
ManintheMiddle("Man-in-the-Middle"),
Masquerading("Masquerading"),
Modify_Authentication_Process("Modify Authentication Process"),
Modify_Registry("Modify Registry"),
Network_Denial_of_Service("Network Denial of Service"),
Network_Service_Scanning("Network Service Scanning"),
Network_Sniffing("Network Sniffing"),
NonApplication_Layer_Protocol("Non-Application Layer Protocol"),
NonStandard_Port("Non-Standard Port"),
Obtain_Capabilities("Obtain Capabilities"),
Obfuscated_Files_or_Information("Obfuscated Files or Information"),
Office_Application_Startup("Office Application Startup"),
OS_Credential_Dumping("OS Credential Dumping"),
Permission_Groups_Discovery("Permission Groups Discovery"),
Phishing("Phishing"),
PreOS_Boot("Pre-OS Boot"),
Process_Discovery("Process Discovery"),
Process_Injection("Process Injection"),
Protocol_Tunneling("Protocol Tunneling"),
Proxy("Proxy"),
Query_Registry("Query Registry"),
Remote_Access_Software("Remote Access Software"),
Remote_Service_Session_Hijacking("Remote Service Session Hijacking"),
Remote_Services("Remote Services"),
Remote_System_Discovery("Remote System Discovery"),
Resource_Hijacking("Resource Hijacking"),
Scheduled_Task_Job("Scheduled Task/Job"),
Screen_Capture("Screen Capture"),
Search_VictimOwned_Websites("Search Victim-Owned Websites"),
Server_Software_Component("Server Software Component"),
Service_Stop("Service Stop"),
Signed_Binary_Proxy_Execution("Signed Binary Proxy Execution"),
Software_Deployment_Tools("Software Deployment Tools"),
SQL_Stored_Procedures("SQL Stored Procedures"),
Steal_or_Forge_Kerberos_Tickets("Steal or Forge Kerberos Tickets"),
Subvert_Trust_Controls("Subvert Trust Controls"),
Supply_Chain_Compromise("Supply Chain Compromise"),
System_Information_Discovery("System Information Discovery"),
Taint_Shared_Content("Taint Shared Content"),
Traffic_Signaling("Traffic Signaling"),
Transfer_Data_to_Cloud_Account("Transfer Data to Cloud Account"),
Trusted_Relationship("Trusted Relationship"),
Unsecured_Credentials("Unsecured Credentials"),
User_Execution("User Execution"),
Valid_Accounts("Valid Accounts"),
Windows_Management_Instrumentation("Windows Management Instrumentation"),
File_and_Directory_Permissions_Modification("File and Directory Permissions Modification");
private final String value;
Techniques(String value) {
this.value = Objects.requireNonNull(value);
}
@EnumType.Converter
public String getValue() {
return this.value;
}
@Override
public java.lang.String toString() {
return new StringJoiner(", ", "Techniques[", "]")
.add("value='" + this.value + "'")
.toString();
}
}
© 2015 - 2024 Weber Informatics LLC | Privacy Policy