0% found this document useful (0 votes)
101 views

iOS Attack

The document is an MITRE ATT&CK matrix that outlines techniques used in iOS attacks. It covers techniques related to initial access, execution, persistence, privilege escalation, defense evasion, discovery, lateral movement, collection, command and control, and exfiltration. Example techniques include generating traffic from the victim, lockscreen bypass, scheduled tasks/jobs, process injection, credential access from the keychain, and exfiltration over unencrypted non-C2 protocols.

Uploaded by

rakivanatan
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
101 views

iOS Attack

The document is an MITRE ATT&CK matrix that outlines techniques used in iOS attacks. It covers techniques related to initial access, execution, persistence, privilege escalation, defense evasion, discovery, lateral movement, collection, command and control, and exfiltration. Example techniques include generating traffic from the victim, lockscreen bypass, scheduled tasks/jobs, process injection, credential access from the keychain, and exfiltration over unencrypted non-C2 protocols.

Uploaded by

rakivanatan
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

MITRE ATT&CK / iOS Matrix

T1642 Endpoint Denial of Service T1456 Drive-By Compromise

T1643 Generate Traffic from Victim T1461 Lockscreen Bypass


ID:TA0034 Impact
T1464 Network Denial of Service T1458 Replication Through Removable Media
ID:TA0027 Initial Access
Compromise Software Dependencies and Development Tools
Exfiltration Over Unencrypted Non-C2 Protocol T1639 Exfiltration Over Alternative Protocol T1474 Supply Chain Compromise Compromise Hardware Supply Chain
T1646 Exfiltration Over C2 Channel ID:TA0036 Exfiltration Compromise Software Supply Chain

Web Protocols T1437 Application Layer Protocol T1623 Command and Scripting Interpreter Unix Shell
Domain Generation Algorithms T1637 Dynamic Resolution ID:TA0041 Execution T1603 Scheduled Task/Job
Symmetric Cryptography
T1521 Encrypted Channel
Asymmetric Cryptography T1398 Boot or Logon Initialization Scripts

T1544 Ingress Tool Transfer T1645 Compromise Client Software Binary


ID:TA0037 Command and Control ID:TA0028 Persistence
T1509 Non-Standard Port T1603 Scheduled Task/Job

T1644 Out of Band Data

Dead Drop Resolver T1404 Exploitation for Privilege Escalation

Bidirectional Communication T1481 Web Service


ID:TA0029 Privilege Escalation T1631 Process Injection Ptrace System Calls

One-Way Communication
T1407 Download New Code at Runtime

T1638 Adversary-in-the-Middle T1627 Execution Guardrails Geofencing

T1532 Archive Collected Data T1630 Indicator Removal on Host Disguise Root/Jailbreak Indicators

T1429 Audio Capture T1406 Obfuscated Files or Information Software Packing


ID:TA0030 Defense Evasion
T1414 Clipboard Data T1631 Process Injection Ptrace System Calls

T1533 Data from Local System T1632 Subvert Trust Controls Code Signing Policy Modification

Keylogging T1633 Virtualization/Sandbox Evasion System Checks


T1417 Input Capture
GUI Input Capture
T1414 Clipboard Data
Remote Device Management Services
T1430 Location Tracking ID:TA0035 Collection T1634 Credentials from Password Store Keychain
Impersonate SS7 Nodes
Keylogging
Calendar Entries ID:TA0031 Credential Access T1417 Input Capture
GUI Input Capture
Call Log
T1636 Protected User Data T1635 Steal Application Access Token URI Hijacking
Contact List

SMS Messages

T1409 Stored Application Data

T1512 Video Capture


@hackinarticles

T1428 Exploitation of Remote Services


https://github.com/Ignitetechnologies
T1458 Replication Through Removable Media ID:TA0033 Lateral Movement

https://in.linkedin.com/company/hackingarticles
T1420 File and Directory Discovery

Remote Device Management Services


T1430 Location Tracking
Impersonate SS7 Nodes

T1423 Network Service Scanning

T1424 Process Discovery ID:TA0032 Discovery


Security Software Discovery T1418 Software Discovery

T1426 System Information Discovery

T1422 System Network Configuration Discovery

You might also like