All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.pulumi.azurenative.security.kotlin.enums.Techniques.kt Maven / Gradle / Ivy

@file:Suppress("NAME_SHADOWING", "DEPRECATION")

package com.pulumi.azurenative.security.kotlin.enums

import com.pulumi.kotlin.ConvertibleToJava
import kotlin.Suppress

/**
 * Techniques of the assessment
 */
public enum class Techniques(
    public val javaValue: com.pulumi.azurenative.security.enums.Techniques,
) : ConvertibleToJava {
    Abuse_Elevation_Control_Mechanism(com.pulumi.azurenative.security.enums.Techniques.Abuse_Elevation_Control_Mechanism),
    Access_Token_Manipulation(com.pulumi.azurenative.security.enums.Techniques.Access_Token_Manipulation),
    Account_Discovery(com.pulumi.azurenative.security.enums.Techniques.Account_Discovery),
    Account_Manipulation(com.pulumi.azurenative.security.enums.Techniques.Account_Manipulation),
    Active_Scanning(com.pulumi.azurenative.security.enums.Techniques.Active_Scanning),
    Application_Layer_Protocol(com.pulumi.azurenative.security.enums.Techniques.Application_Layer_Protocol),
    Audio_Capture(com.pulumi.azurenative.security.enums.Techniques.Audio_Capture),
    Boot_or_Logon_Autostart_Execution(com.pulumi.azurenative.security.enums.Techniques.Boot_or_Logon_Autostart_Execution),
    Boot_or_Logon_Initialization_Scripts(com.pulumi.azurenative.security.enums.Techniques.Boot_or_Logon_Initialization_Scripts),
    Brute_Force(com.pulumi.azurenative.security.enums.Techniques.Brute_Force),
    Cloud_Infrastructure_Discovery(com.pulumi.azurenative.security.enums.Techniques.Cloud_Infrastructure_Discovery),
    Cloud_Service_Dashboard(com.pulumi.azurenative.security.enums.Techniques.Cloud_Service_Dashboard),
    Cloud_Service_Discovery(com.pulumi.azurenative.security.enums.Techniques.Cloud_Service_Discovery),
    Command_and_Scripting_Interpreter(com.pulumi.azurenative.security.enums.Techniques.Command_and_Scripting_Interpreter),
    Compromise_Client_Software_Binary(com.pulumi.azurenative.security.enums.Techniques.Compromise_Client_Software_Binary),
    Compromise_Infrastructure(com.pulumi.azurenative.security.enums.Techniques.Compromise_Infrastructure),
    Container_and_Resource_Discovery(com.pulumi.azurenative.security.enums.Techniques.Container_and_Resource_Discovery),
    Create_Account(com.pulumi.azurenative.security.enums.Techniques.Create_Account),
    Create_or_Modify_System_Process(com.pulumi.azurenative.security.enums.Techniques.Create_or_Modify_System_Process),
    Credentials_from_Password_Stores(com.pulumi.azurenative.security.enums.Techniques.Credentials_from_Password_Stores),
    Data_Destruction(com.pulumi.azurenative.security.enums.Techniques.Data_Destruction),
    Data_Encrypted_for_Impact(com.pulumi.azurenative.security.enums.Techniques.Data_Encrypted_for_Impact),
    Data_from_Cloud_Storage_Object(com.pulumi.azurenative.security.enums.Techniques.Data_from_Cloud_Storage_Object),
    Data_from_Configuration_Repository(com.pulumi.azurenative.security.enums.Techniques.Data_from_Configuration_Repository),
    Data_from_Information_Repositories(com.pulumi.azurenative.security.enums.Techniques.Data_from_Information_Repositories),
    Data_from_Local_System(com.pulumi.azurenative.security.enums.Techniques.Data_from_Local_System),
    Data_Manipulation(com.pulumi.azurenative.security.enums.Techniques.Data_Manipulation),
    Data_Staged(com.pulumi.azurenative.security.enums.Techniques.Data_Staged),
    Defacement(com.pulumi.azurenative.security.enums.Techniques.Defacement),
    Deobfuscate_Decode_Files_or_Information(com.pulumi.azurenative.security.enums.Techniques.Deobfuscate_Decode_Files_or_Information),
    Disk_Wipe(com.pulumi.azurenative.security.enums.Techniques.Disk_Wipe),
    Domain_Trust_Discovery(com.pulumi.azurenative.security.enums.Techniques.Domain_Trust_Discovery),
    Driveby_Compromise(com.pulumi.azurenative.security.enums.Techniques.Driveby_Compromise),
    Dynamic_Resolution(com.pulumi.azurenative.security.enums.Techniques.Dynamic_Resolution),
    Endpoint_Denial_of_Service(com.pulumi.azurenative.security.enums.Techniques.Endpoint_Denial_of_Service),
    Event_Triggered_Execution(com.pulumi.azurenative.security.enums.Techniques.Event_Triggered_Execution),
    Exfiltration_Over_Alternative_Protocol(com.pulumi.azurenative.security.enums.Techniques.Exfiltration_Over_Alternative_Protocol),
    Exploit_PublicFacing_Application(com.pulumi.azurenative.security.enums.Techniques.Exploit_PublicFacing_Application),
    Exploitation_for_Client_Execution(com.pulumi.azurenative.security.enums.Techniques.Exploitation_for_Client_Execution),
    Exploitation_for_Credential_Access(com.pulumi.azurenative.security.enums.Techniques.Exploitation_for_Credential_Access),
    Exploitation_for_Defense_Evasion(com.pulumi.azurenative.security.enums.Techniques.Exploitation_for_Defense_Evasion),
    Exploitation_for_Privilege_Escalation(com.pulumi.azurenative.security.enums.Techniques.Exploitation_for_Privilege_Escalation),
    Exploitation_of_Remote_Services(com.pulumi.azurenative.security.enums.Techniques.Exploitation_of_Remote_Services),
    External_Remote_Services(com.pulumi.azurenative.security.enums.Techniques.External_Remote_Services),
    Fallback_Channels(com.pulumi.azurenative.security.enums.Techniques.Fallback_Channels),
    File_and_Directory_Discovery(com.pulumi.azurenative.security.enums.Techniques.File_and_Directory_Discovery),
    Gather_Victim_Network_Information(com.pulumi.azurenative.security.enums.Techniques.Gather_Victim_Network_Information),
    Hide_Artifacts(com.pulumi.azurenative.security.enums.Techniques.Hide_Artifacts),
    Hijack_Execution_Flow(com.pulumi.azurenative.security.enums.Techniques.Hijack_Execution_Flow),
    Impair_Defenses(com.pulumi.azurenative.security.enums.Techniques.Impair_Defenses),
    Implant_Container_Image(com.pulumi.azurenative.security.enums.Techniques.Implant_Container_Image),
    Indicator_Removal_on_Host(com.pulumi.azurenative.security.enums.Techniques.Indicator_Removal_on_Host),
    Indirect_Command_Execution(com.pulumi.azurenative.security.enums.Techniques.Indirect_Command_Execution),
    Ingress_Tool_Transfer(com.pulumi.azurenative.security.enums.Techniques.Ingress_Tool_Transfer),
    Input_Capture(com.pulumi.azurenative.security.enums.Techniques.Input_Capture),
    InterProcess_Communication(com.pulumi.azurenative.security.enums.Techniques.InterProcess_Communication),
    Lateral_Tool_Transfer(com.pulumi.azurenative.security.enums.Techniques.Lateral_Tool_Transfer),
    ManintheMiddle(com.pulumi.azurenative.security.enums.Techniques.ManintheMiddle),
    Masquerading(com.pulumi.azurenative.security.enums.Techniques.Masquerading),
    Modify_Authentication_Process(com.pulumi.azurenative.security.enums.Techniques.Modify_Authentication_Process),
    Modify_Registry(com.pulumi.azurenative.security.enums.Techniques.Modify_Registry),
    Network_Denial_of_Service(com.pulumi.azurenative.security.enums.Techniques.Network_Denial_of_Service),
    Network_Service_Scanning(com.pulumi.azurenative.security.enums.Techniques.Network_Service_Scanning),
    Network_Sniffing(com.pulumi.azurenative.security.enums.Techniques.Network_Sniffing),
    NonApplication_Layer_Protocol(com.pulumi.azurenative.security.enums.Techniques.NonApplication_Layer_Protocol),
    NonStandard_Port(com.pulumi.azurenative.security.enums.Techniques.NonStandard_Port),
    Obtain_Capabilities(com.pulumi.azurenative.security.enums.Techniques.Obtain_Capabilities),
    Obfuscated_Files_or_Information(com.pulumi.azurenative.security.enums.Techniques.Obfuscated_Files_or_Information),
    Office_Application_Startup(com.pulumi.azurenative.security.enums.Techniques.Office_Application_Startup),
    OS_Credential_Dumping(com.pulumi.azurenative.security.enums.Techniques.OS_Credential_Dumping),
    Permission_Groups_Discovery(com.pulumi.azurenative.security.enums.Techniques.Permission_Groups_Discovery),
    Phishing(com.pulumi.azurenative.security.enums.Techniques.Phishing),
    PreOS_Boot(com.pulumi.azurenative.security.enums.Techniques.PreOS_Boot),
    Process_Discovery(com.pulumi.azurenative.security.enums.Techniques.Process_Discovery),
    Process_Injection(com.pulumi.azurenative.security.enums.Techniques.Process_Injection),
    Protocol_Tunneling(com.pulumi.azurenative.security.enums.Techniques.Protocol_Tunneling),
    Proxy(com.pulumi.azurenative.security.enums.Techniques.Proxy),
    Query_Registry(com.pulumi.azurenative.security.enums.Techniques.Query_Registry),
    Remote_Access_Software(com.pulumi.azurenative.security.enums.Techniques.Remote_Access_Software),
    Remote_Service_Session_Hijacking(com.pulumi.azurenative.security.enums.Techniques.Remote_Service_Session_Hijacking),
    Remote_Services(com.pulumi.azurenative.security.enums.Techniques.Remote_Services),
    Remote_System_Discovery(com.pulumi.azurenative.security.enums.Techniques.Remote_System_Discovery),
    Resource_Hijacking(com.pulumi.azurenative.security.enums.Techniques.Resource_Hijacking),
    Scheduled_Task_Job(com.pulumi.azurenative.security.enums.Techniques.Scheduled_Task_Job),
    Screen_Capture(com.pulumi.azurenative.security.enums.Techniques.Screen_Capture),
    Search_VictimOwned_Websites(com.pulumi.azurenative.security.enums.Techniques.Search_VictimOwned_Websites),
    Server_Software_Component(com.pulumi.azurenative.security.enums.Techniques.Server_Software_Component),
    Service_Stop(com.pulumi.azurenative.security.enums.Techniques.Service_Stop),
    Signed_Binary_Proxy_Execution(com.pulumi.azurenative.security.enums.Techniques.Signed_Binary_Proxy_Execution),
    Software_Deployment_Tools(com.pulumi.azurenative.security.enums.Techniques.Software_Deployment_Tools),
    SQL_Stored_Procedures(com.pulumi.azurenative.security.enums.Techniques.SQL_Stored_Procedures),
    Steal_or_Forge_Kerberos_Tickets(com.pulumi.azurenative.security.enums.Techniques.Steal_or_Forge_Kerberos_Tickets),
    Subvert_Trust_Controls(com.pulumi.azurenative.security.enums.Techniques.Subvert_Trust_Controls),
    Supply_Chain_Compromise(com.pulumi.azurenative.security.enums.Techniques.Supply_Chain_Compromise),
    System_Information_Discovery(com.pulumi.azurenative.security.enums.Techniques.System_Information_Discovery),
    Taint_Shared_Content(com.pulumi.azurenative.security.enums.Techniques.Taint_Shared_Content),
    Traffic_Signaling(com.pulumi.azurenative.security.enums.Techniques.Traffic_Signaling),
    Transfer_Data_to_Cloud_Account(com.pulumi.azurenative.security.enums.Techniques.Transfer_Data_to_Cloud_Account),
    Trusted_Relationship(com.pulumi.azurenative.security.enums.Techniques.Trusted_Relationship),
    Unsecured_Credentials(com.pulumi.azurenative.security.enums.Techniques.Unsecured_Credentials),
    User_Execution(com.pulumi.azurenative.security.enums.Techniques.User_Execution),
    Valid_Accounts(com.pulumi.azurenative.security.enums.Techniques.Valid_Accounts),
    Windows_Management_Instrumentation(com.pulumi.azurenative.security.enums.Techniques.Windows_Management_Instrumentation),
    File_and_Directory_Permissions_Modification(com.pulumi.azurenative.security.enums.Techniques.File_and_Directory_Permissions_Modification),
    ;

    override fun toJava(): com.pulumi.azurenative.security.enums.Techniques = javaValue

    public companion object {
        public fun toKotlin(javaType: com.pulumi.azurenative.security.enums.Techniques): Techniques =
            Techniques.values().first { it.javaValue == javaType }
    }
}




© 2015 - 2024 Weber Informatics LLC | Privacy Policy