All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.pulumi.azurenative.security.enums.Techniques Maven / Gradle / Ivy

There is a newer version: 2.72.0
Show newest version
// *** WARNING: this file was generated by pulumi-java-gen. ***
// *** Do not edit by hand unless you're certain you know what you are doing! ***

package com.pulumi.azurenative.security.enums;

import com.pulumi.core.annotations.EnumType;
import java.lang.String;
import java.util.Objects;
import java.util.StringJoiner;

    /**
     * Techniques of the assessment
     * 
     */
    @EnumType
    public enum Techniques {
        Abuse_Elevation_Control_Mechanism("Abuse Elevation Control Mechanism"),
        Access_Token_Manipulation("Access Token Manipulation"),
        Account_Discovery("Account Discovery"),
        Account_Manipulation("Account Manipulation"),
        Active_Scanning("Active Scanning"),
        Application_Layer_Protocol("Application Layer Protocol"),
        Audio_Capture("Audio Capture"),
        Boot_or_Logon_Autostart_Execution("Boot or Logon Autostart Execution"),
        Boot_or_Logon_Initialization_Scripts("Boot or Logon Initialization Scripts"),
        Brute_Force("Brute Force"),
        Cloud_Infrastructure_Discovery("Cloud Infrastructure Discovery"),
        Cloud_Service_Dashboard("Cloud Service Dashboard"),
        Cloud_Service_Discovery("Cloud Service Discovery"),
        Command_and_Scripting_Interpreter("Command and Scripting Interpreter"),
        Compromise_Client_Software_Binary("Compromise Client Software Binary"),
        Compromise_Infrastructure("Compromise Infrastructure"),
        Container_and_Resource_Discovery("Container and Resource Discovery"),
        Create_Account("Create Account"),
        Create_or_Modify_System_Process("Create or Modify System Process"),
        Credentials_from_Password_Stores("Credentials from Password Stores"),
        Data_Destruction("Data Destruction"),
        Data_Encrypted_for_Impact("Data Encrypted for Impact"),
        Data_from_Cloud_Storage_Object("Data from Cloud Storage Object"),
        Data_from_Configuration_Repository("Data from Configuration Repository"),
        Data_from_Information_Repositories("Data from Information Repositories"),
        Data_from_Local_System("Data from Local System"),
        Data_Manipulation("Data Manipulation"),
        Data_Staged("Data Staged"),
        Defacement("Defacement"),
        Deobfuscate_Decode_Files_or_Information("Deobfuscate/Decode Files or Information"),
        Disk_Wipe("Disk Wipe"),
        Domain_Trust_Discovery("Domain Trust Discovery"),
        Driveby_Compromise("Drive-by Compromise"),
        Dynamic_Resolution("Dynamic Resolution"),
        Endpoint_Denial_of_Service("Endpoint Denial of Service"),
        Event_Triggered_Execution("Event Triggered Execution"),
        Exfiltration_Over_Alternative_Protocol("Exfiltration Over Alternative Protocol"),
        Exploit_PublicFacing_Application("Exploit Public-Facing Application"),
        Exploitation_for_Client_Execution("Exploitation for Client Execution"),
        Exploitation_for_Credential_Access("Exploitation for Credential Access"),
        Exploitation_for_Defense_Evasion("Exploitation for Defense Evasion"),
        Exploitation_for_Privilege_Escalation("Exploitation for Privilege Escalation"),
        Exploitation_of_Remote_Services("Exploitation of Remote Services"),
        External_Remote_Services("External Remote Services"),
        Fallback_Channels("Fallback Channels"),
        File_and_Directory_Discovery("File and Directory Discovery"),
        Gather_Victim_Network_Information("Gather Victim Network Information"),
        Hide_Artifacts("Hide Artifacts"),
        Hijack_Execution_Flow("Hijack Execution Flow"),
        Impair_Defenses("Impair Defenses"),
        Implant_Container_Image("Implant Container Image"),
        Indicator_Removal_on_Host("Indicator Removal on Host"),
        Indirect_Command_Execution("Indirect Command Execution"),
        Ingress_Tool_Transfer("Ingress Tool Transfer"),
        Input_Capture("Input Capture"),
        InterProcess_Communication("Inter-Process Communication"),
        Lateral_Tool_Transfer("Lateral Tool Transfer"),
        ManintheMiddle("Man-in-the-Middle"),
        Masquerading("Masquerading"),
        Modify_Authentication_Process("Modify Authentication Process"),
        Modify_Registry("Modify Registry"),
        Network_Denial_of_Service("Network Denial of Service"),
        Network_Service_Scanning("Network Service Scanning"),
        Network_Sniffing("Network Sniffing"),
        NonApplication_Layer_Protocol("Non-Application Layer Protocol"),
        NonStandard_Port("Non-Standard Port"),
        Obtain_Capabilities("Obtain Capabilities"),
        Obfuscated_Files_or_Information("Obfuscated Files or Information"),
        Office_Application_Startup("Office Application Startup"),
        OS_Credential_Dumping("OS Credential Dumping"),
        Permission_Groups_Discovery("Permission Groups Discovery"),
        Phishing("Phishing"),
        PreOS_Boot("Pre-OS Boot"),
        Process_Discovery("Process Discovery"),
        Process_Injection("Process Injection"),
        Protocol_Tunneling("Protocol Tunneling"),
        Proxy("Proxy"),
        Query_Registry("Query Registry"),
        Remote_Access_Software("Remote Access Software"),
        Remote_Service_Session_Hijacking("Remote Service Session Hijacking"),
        Remote_Services("Remote Services"),
        Remote_System_Discovery("Remote System Discovery"),
        Resource_Hijacking("Resource Hijacking"),
        Scheduled_Task_Job("Scheduled Task/Job"),
        Screen_Capture("Screen Capture"),
        Search_VictimOwned_Websites("Search Victim-Owned Websites"),
        Server_Software_Component("Server Software Component"),
        Service_Stop("Service Stop"),
        Signed_Binary_Proxy_Execution("Signed Binary Proxy Execution"),
        Software_Deployment_Tools("Software Deployment Tools"),
        SQL_Stored_Procedures("SQL Stored Procedures"),
        Steal_or_Forge_Kerberos_Tickets("Steal or Forge Kerberos Tickets"),
        Subvert_Trust_Controls("Subvert Trust Controls"),
        Supply_Chain_Compromise("Supply Chain Compromise"),
        System_Information_Discovery("System Information Discovery"),
        Taint_Shared_Content("Taint Shared Content"),
        Traffic_Signaling("Traffic Signaling"),
        Transfer_Data_to_Cloud_Account("Transfer Data to Cloud Account"),
        Trusted_Relationship("Trusted Relationship"),
        Unsecured_Credentials("Unsecured Credentials"),
        User_Execution("User Execution"),
        Valid_Accounts("Valid Accounts"),
        Windows_Management_Instrumentation("Windows Management Instrumentation"),
        File_and_Directory_Permissions_Modification("File and Directory Permissions Modification");

        private final String value;

        Techniques(String value) {
            this.value = Objects.requireNonNull(value);
        }

        @EnumType.Converter
        public String getValue() {
            return this.value;
        }

        @Override
        public java.lang.String toString() {
            return new StringJoiner(", ", "Techniques[", "]")
                .add("value='" + this.value + "'")
                .toString();
        }
    }




© 2015 - 2024 Weber Informatics LLC | Privacy Policy