Please wait. This can take some minutes ...
Many resources are needed to download a project. Please understand that we have to compensate our server costs. Thank you in advance.
Project price only 1 $
You can buy this project and download/modify it how often you want.
com.pulumi.azurenative.security.kotlin.enums.Techniques.kt Maven / Gradle / Ivy
@file:Suppress("NAME_SHADOWING", "DEPRECATION")
package com.pulumi.azurenative.security.kotlin.enums
import com.pulumi.kotlin.ConvertibleToJava
import kotlin.Suppress
/**
* Techniques of the assessment
*/
public enum class Techniques(
public val javaValue: com.pulumi.azurenative.security.enums.Techniques,
) : ConvertibleToJava {
Abuse_Elevation_Control_Mechanism(com.pulumi.azurenative.security.enums.Techniques.Abuse_Elevation_Control_Mechanism),
Access_Token_Manipulation(com.pulumi.azurenative.security.enums.Techniques.Access_Token_Manipulation),
Account_Discovery(com.pulumi.azurenative.security.enums.Techniques.Account_Discovery),
Account_Manipulation(com.pulumi.azurenative.security.enums.Techniques.Account_Manipulation),
Active_Scanning(com.pulumi.azurenative.security.enums.Techniques.Active_Scanning),
Application_Layer_Protocol(com.pulumi.azurenative.security.enums.Techniques.Application_Layer_Protocol),
Audio_Capture(com.pulumi.azurenative.security.enums.Techniques.Audio_Capture),
Boot_or_Logon_Autostart_Execution(com.pulumi.azurenative.security.enums.Techniques.Boot_or_Logon_Autostart_Execution),
Boot_or_Logon_Initialization_Scripts(com.pulumi.azurenative.security.enums.Techniques.Boot_or_Logon_Initialization_Scripts),
Brute_Force(com.pulumi.azurenative.security.enums.Techniques.Brute_Force),
Cloud_Infrastructure_Discovery(com.pulumi.azurenative.security.enums.Techniques.Cloud_Infrastructure_Discovery),
Cloud_Service_Dashboard(com.pulumi.azurenative.security.enums.Techniques.Cloud_Service_Dashboard),
Cloud_Service_Discovery(com.pulumi.azurenative.security.enums.Techniques.Cloud_Service_Discovery),
Command_and_Scripting_Interpreter(com.pulumi.azurenative.security.enums.Techniques.Command_and_Scripting_Interpreter),
Compromise_Client_Software_Binary(com.pulumi.azurenative.security.enums.Techniques.Compromise_Client_Software_Binary),
Compromise_Infrastructure(com.pulumi.azurenative.security.enums.Techniques.Compromise_Infrastructure),
Container_and_Resource_Discovery(com.pulumi.azurenative.security.enums.Techniques.Container_and_Resource_Discovery),
Create_Account(com.pulumi.azurenative.security.enums.Techniques.Create_Account),
Create_or_Modify_System_Process(com.pulumi.azurenative.security.enums.Techniques.Create_or_Modify_System_Process),
Credentials_from_Password_Stores(com.pulumi.azurenative.security.enums.Techniques.Credentials_from_Password_Stores),
Data_Destruction(com.pulumi.azurenative.security.enums.Techniques.Data_Destruction),
Data_Encrypted_for_Impact(com.pulumi.azurenative.security.enums.Techniques.Data_Encrypted_for_Impact),
Data_from_Cloud_Storage_Object(com.pulumi.azurenative.security.enums.Techniques.Data_from_Cloud_Storage_Object),
Data_from_Configuration_Repository(com.pulumi.azurenative.security.enums.Techniques.Data_from_Configuration_Repository),
Data_from_Information_Repositories(com.pulumi.azurenative.security.enums.Techniques.Data_from_Information_Repositories),
Data_from_Local_System(com.pulumi.azurenative.security.enums.Techniques.Data_from_Local_System),
Data_Manipulation(com.pulumi.azurenative.security.enums.Techniques.Data_Manipulation),
Data_Staged(com.pulumi.azurenative.security.enums.Techniques.Data_Staged),
Defacement(com.pulumi.azurenative.security.enums.Techniques.Defacement),
Deobfuscate_Decode_Files_or_Information(com.pulumi.azurenative.security.enums.Techniques.Deobfuscate_Decode_Files_or_Information),
Disk_Wipe(com.pulumi.azurenative.security.enums.Techniques.Disk_Wipe),
Domain_Trust_Discovery(com.pulumi.azurenative.security.enums.Techniques.Domain_Trust_Discovery),
Driveby_Compromise(com.pulumi.azurenative.security.enums.Techniques.Driveby_Compromise),
Dynamic_Resolution(com.pulumi.azurenative.security.enums.Techniques.Dynamic_Resolution),
Endpoint_Denial_of_Service(com.pulumi.azurenative.security.enums.Techniques.Endpoint_Denial_of_Service),
Event_Triggered_Execution(com.pulumi.azurenative.security.enums.Techniques.Event_Triggered_Execution),
Exfiltration_Over_Alternative_Protocol(com.pulumi.azurenative.security.enums.Techniques.Exfiltration_Over_Alternative_Protocol),
Exploit_PublicFacing_Application(com.pulumi.azurenative.security.enums.Techniques.Exploit_PublicFacing_Application),
Exploitation_for_Client_Execution(com.pulumi.azurenative.security.enums.Techniques.Exploitation_for_Client_Execution),
Exploitation_for_Credential_Access(com.pulumi.azurenative.security.enums.Techniques.Exploitation_for_Credential_Access),
Exploitation_for_Defense_Evasion(com.pulumi.azurenative.security.enums.Techniques.Exploitation_for_Defense_Evasion),
Exploitation_for_Privilege_Escalation(com.pulumi.azurenative.security.enums.Techniques.Exploitation_for_Privilege_Escalation),
Exploitation_of_Remote_Services(com.pulumi.azurenative.security.enums.Techniques.Exploitation_of_Remote_Services),
External_Remote_Services(com.pulumi.azurenative.security.enums.Techniques.External_Remote_Services),
Fallback_Channels(com.pulumi.azurenative.security.enums.Techniques.Fallback_Channels),
File_and_Directory_Discovery(com.pulumi.azurenative.security.enums.Techniques.File_and_Directory_Discovery),
Gather_Victim_Network_Information(com.pulumi.azurenative.security.enums.Techniques.Gather_Victim_Network_Information),
Hide_Artifacts(com.pulumi.azurenative.security.enums.Techniques.Hide_Artifacts),
Hijack_Execution_Flow(com.pulumi.azurenative.security.enums.Techniques.Hijack_Execution_Flow),
Impair_Defenses(com.pulumi.azurenative.security.enums.Techniques.Impair_Defenses),
Implant_Container_Image(com.pulumi.azurenative.security.enums.Techniques.Implant_Container_Image),
Indicator_Removal_on_Host(com.pulumi.azurenative.security.enums.Techniques.Indicator_Removal_on_Host),
Indirect_Command_Execution(com.pulumi.azurenative.security.enums.Techniques.Indirect_Command_Execution),
Ingress_Tool_Transfer(com.pulumi.azurenative.security.enums.Techniques.Ingress_Tool_Transfer),
Input_Capture(com.pulumi.azurenative.security.enums.Techniques.Input_Capture),
InterProcess_Communication(com.pulumi.azurenative.security.enums.Techniques.InterProcess_Communication),
Lateral_Tool_Transfer(com.pulumi.azurenative.security.enums.Techniques.Lateral_Tool_Transfer),
ManintheMiddle(com.pulumi.azurenative.security.enums.Techniques.ManintheMiddle),
Masquerading(com.pulumi.azurenative.security.enums.Techniques.Masquerading),
Modify_Authentication_Process(com.pulumi.azurenative.security.enums.Techniques.Modify_Authentication_Process),
Modify_Registry(com.pulumi.azurenative.security.enums.Techniques.Modify_Registry),
Network_Denial_of_Service(com.pulumi.azurenative.security.enums.Techniques.Network_Denial_of_Service),
Network_Service_Scanning(com.pulumi.azurenative.security.enums.Techniques.Network_Service_Scanning),
Network_Sniffing(com.pulumi.azurenative.security.enums.Techniques.Network_Sniffing),
NonApplication_Layer_Protocol(com.pulumi.azurenative.security.enums.Techniques.NonApplication_Layer_Protocol),
NonStandard_Port(com.pulumi.azurenative.security.enums.Techniques.NonStandard_Port),
Obtain_Capabilities(com.pulumi.azurenative.security.enums.Techniques.Obtain_Capabilities),
Obfuscated_Files_or_Information(com.pulumi.azurenative.security.enums.Techniques.Obfuscated_Files_or_Information),
Office_Application_Startup(com.pulumi.azurenative.security.enums.Techniques.Office_Application_Startup),
OS_Credential_Dumping(com.pulumi.azurenative.security.enums.Techniques.OS_Credential_Dumping),
Permission_Groups_Discovery(com.pulumi.azurenative.security.enums.Techniques.Permission_Groups_Discovery),
Phishing(com.pulumi.azurenative.security.enums.Techniques.Phishing),
PreOS_Boot(com.pulumi.azurenative.security.enums.Techniques.PreOS_Boot),
Process_Discovery(com.pulumi.azurenative.security.enums.Techniques.Process_Discovery),
Process_Injection(com.pulumi.azurenative.security.enums.Techniques.Process_Injection),
Protocol_Tunneling(com.pulumi.azurenative.security.enums.Techniques.Protocol_Tunneling),
Proxy(com.pulumi.azurenative.security.enums.Techniques.Proxy),
Query_Registry(com.pulumi.azurenative.security.enums.Techniques.Query_Registry),
Remote_Access_Software(com.pulumi.azurenative.security.enums.Techniques.Remote_Access_Software),
Remote_Service_Session_Hijacking(com.pulumi.azurenative.security.enums.Techniques.Remote_Service_Session_Hijacking),
Remote_Services(com.pulumi.azurenative.security.enums.Techniques.Remote_Services),
Remote_System_Discovery(com.pulumi.azurenative.security.enums.Techniques.Remote_System_Discovery),
Resource_Hijacking(com.pulumi.azurenative.security.enums.Techniques.Resource_Hijacking),
Scheduled_Task_Job(com.pulumi.azurenative.security.enums.Techniques.Scheduled_Task_Job),
Screen_Capture(com.pulumi.azurenative.security.enums.Techniques.Screen_Capture),
Search_VictimOwned_Websites(com.pulumi.azurenative.security.enums.Techniques.Search_VictimOwned_Websites),
Server_Software_Component(com.pulumi.azurenative.security.enums.Techniques.Server_Software_Component),
Service_Stop(com.pulumi.azurenative.security.enums.Techniques.Service_Stop),
Signed_Binary_Proxy_Execution(com.pulumi.azurenative.security.enums.Techniques.Signed_Binary_Proxy_Execution),
Software_Deployment_Tools(com.pulumi.azurenative.security.enums.Techniques.Software_Deployment_Tools),
SQL_Stored_Procedures(com.pulumi.azurenative.security.enums.Techniques.SQL_Stored_Procedures),
Steal_or_Forge_Kerberos_Tickets(com.pulumi.azurenative.security.enums.Techniques.Steal_or_Forge_Kerberos_Tickets),
Subvert_Trust_Controls(com.pulumi.azurenative.security.enums.Techniques.Subvert_Trust_Controls),
Supply_Chain_Compromise(com.pulumi.azurenative.security.enums.Techniques.Supply_Chain_Compromise),
System_Information_Discovery(com.pulumi.azurenative.security.enums.Techniques.System_Information_Discovery),
Taint_Shared_Content(com.pulumi.azurenative.security.enums.Techniques.Taint_Shared_Content),
Traffic_Signaling(com.pulumi.azurenative.security.enums.Techniques.Traffic_Signaling),
Transfer_Data_to_Cloud_Account(com.pulumi.azurenative.security.enums.Techniques.Transfer_Data_to_Cloud_Account),
Trusted_Relationship(com.pulumi.azurenative.security.enums.Techniques.Trusted_Relationship),
Unsecured_Credentials(com.pulumi.azurenative.security.enums.Techniques.Unsecured_Credentials),
User_Execution(com.pulumi.azurenative.security.enums.Techniques.User_Execution),
Valid_Accounts(com.pulumi.azurenative.security.enums.Techniques.Valid_Accounts),
Windows_Management_Instrumentation(com.pulumi.azurenative.security.enums.Techniques.Windows_Management_Instrumentation),
File_and_Directory_Permissions_Modification(com.pulumi.azurenative.security.enums.Techniques.File_and_Directory_Permissions_Modification),
;
override fun toJava(): com.pulumi.azurenative.security.enums.Techniques = javaValue
public companion object {
public fun toKotlin(javaType: com.pulumi.azurenative.security.enums.Techniques): Techniques =
Techniques.values().first { it.javaValue == javaType }
}
}