Skip to content

Commit

Permalink
Initial html
Browse files Browse the repository at this point in the history
  • Loading branch information
shivaccuknox committed Apr 25, 2024
1 parent 9fd9383 commit f405be3
Show file tree
Hide file tree
Showing 16 changed files with 1,208 additions and 0 deletions.
38 changes: 38 additions & 0 deletions index.html
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@

<h1>Tactics List <h1>
<table>
<th style='text-align: left'>

<th><a href="https://5GSEC.github.io/tactics-TA0043.html">Reconnaissance</a></th>

<th><a href="https://5GSEC.github.io/tactics-TA0042.html">Resource Development</a></th>

<th><a href="https://5GSEC.github.io/tactics-TA0001.html">Initial Access</a></th>

<th><a href="https://5GSEC.github.io/tactics-TA0002.html">Execution</a></th>

<th><a href="https://5GSEC.github.io/tactics-TA0003.html">Persistence</a></th>

<th><a href="https://5GSEC.github.io/tactics-TA0004.html">Privilege Escalation</a></th>

<th><a href="https://5GSEC.github.io/tactics-TA0005.html">Defense Evasion</a></th>

<th><a href="https://5GSEC.github.io/tactics-TA0006.html">Credential Access</a></th>

<th><a href="https://5GSEC.github.io/tactics-TA0007.html">Discovery</a></th>

<th><a href="https://5GSEC.github.io/tactics-TA0008.html">Lateral Movement</a></th>

<th><a href="https://5GSEC.github.io/tactics-TA0009.html">Collection</a></th>

<th><a href="https://5GSEC.github.io/tactics-TA0011.html">Command and Control</a></th>

<th><a href="https://5GSEC.github.io/tactics-TA0010.html">Exfiltration</a></th>

<th><a href="https://5GSEC.github.io/tactics-TA0040.html">Impact</a></th>

<th><a href="https://5GSEC.github.io/tactics-TA5001.html">Fraud</a></th>

</th>
</table>

85 changes: 85 additions & 0 deletions tactic-TA0001.html
Original file line number Diff line number Diff line change
@@ -0,0 +1,85 @@

<h1>Tactic:<a href="https://fight.mitre.org/tactics/TA0001">Initial Access</a></h1>
<table>
<tr style='text-align: left'>
<td>Technique Name</td>
<td>Accuknox Support</td>
</th>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1199.501">MNO Roaming Partners</a></td>
<td>no</th>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT5011">Unauthorized access to Network Exposure Function (NEF) via token fraud</a></td>
<td>no</th>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1195">Supply Chain Compromise</a></td>
<td>no</th>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1078.004">Cloud Accounts</a></td>
<td>no</th>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1195.501">SIM Credential Theft</a></td>
<td>no</th>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1572">Protocol Tunneling</a></td>
<td>no</th>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1190">Exploit Public-Facing Application</a></td>
<td>no</th>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1195.502">Compromise Service Supply Chain</a></td>
<td>no</th>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT5029">Exploit Semi-public Facing Application</a></td>
<td>no</th>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1572.501">UE Access via GTP-U</a></td>
<td>no</th>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT5034">Radio control manipulation via rogue xApps</a></td>
<td>no</th>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1195.002">Compromise Software Supply Chain</a></td>
<td>no</th>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1195.003">Compromise Hardware Supply Chain</a></td>
<td>no</th>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1199">Trusted Relationship</a></td>
<td>no</th>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1078">Valid Accounts</a></td>
<td>no</th>
</tr>

</table>

55 changes: 55 additions & 0 deletions tactic-TA0002.html
Original file line number Diff line number Diff line change
@@ -0,0 +1,55 @@

<h1>Tactic:<a href="https://fight.mitre.org/tactics/TA0002">Execution</a></h1>
<table>
<tr style='text-align: left'>
<td>Technique Name</td>
<td>Accuknox Support</td>
</th>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT5007">Registration of malicious network functions</a></td>
<td>no</th>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1072">Software Deployment Tools</a></td>
<td>no</th>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT5032">gNodeB Component Manipulation</a></td>
<td>no</th>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT5032.001">RAN Intelligent Controller (RIC)</a></td>
<td>no</th>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT5032.002">xApp</a></td>
<td>no</th>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT5032.003">rApp</a></td>
<td>no</th>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1203.501">Over-the-Air Input</a></td>
<td>no</th>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1203.502">Baseband API</a></td>
<td>no</th>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1203">Exploitation for Client Execution</a></td>
<td>no</th>
</tr>

</table>

40 changes: 40 additions & 0 deletions tactic-TA0003.html
Original file line number Diff line number Diff line change
@@ -0,0 +1,40 @@

<h1>Tactic:<a href="https://fight.mitre.org/tactics/TA0003">Persistence</a></h1>
<table>
<tr style='text-align: left'>
<td>Technique Name</td>
<td>Accuknox Support</td>
</th>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1525">Implant Internal Image</a></td>
<td>no</th>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1078.003">Local Accounts</a></td>
<td>no</th>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1542.501">Unauthorized software in NFVI</a></td>
<td>no</th>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1078.004">Cloud Accounts</a></td>
<td>no</th>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1078">Valid Accounts</a></td>
<td>no</th>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1542">Pre-OS Boot</a></td>
<td>no</th>
</tr>

</table>

30 changes: 30 additions & 0 deletions tactic-TA0004.html
Original file line number Diff line number Diff line change
@@ -0,0 +1,30 @@

<h1>Tactic:<a href="https://fight.mitre.org/tactics/TA0004">Privilege Escalation</a></h1>
<table>
<tr style='text-align: left'>
<td>Technique Name</td>
<td>Accuknox Support</td>
</th>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1611">Escape to Host</a></td>
<td>yes</th>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1078.004">Cloud Accounts</a></td>
<td>no</th>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1611.501">Malicious privileged container VNF Shared Resource Access</a></td>
<td>no</th>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1078">Valid Accounts</a></td>
<td>no</th>
</tr>

</table>

110 changes: 110 additions & 0 deletions tactic-TA0005.html
Original file line number Diff line number Diff line change
@@ -0,0 +1,110 @@

<h1>Tactic:<a href="https://fight.mitre.org/tactics/TA0005">Defense Evasion</a></h1>
<table>
<tr style='text-align: left'>
<td>Technique Name</td>
<td>Accuknox Support</td>
</th>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT5002">Bypass home routing</a></td>
<td>no</th>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1562.501">Bid down UE</a></td>
<td>no</th>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT5039">Manipulate Virtual Network Function (VNF) Configuration</a></td>
<td>no</th>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1014">Rootkit</a></td>
<td>no</th>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1542.501">Unauthorized software in NFVI</a></td>
<td>no</th>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1600.501">Radio Interface</a></td>
<td>no</th>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1078.004">Cloud Accounts</a></td>
<td>no</th>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1599.501">Malicious co-tenancy exploit of NFVI (Network Slice)</a></td>
<td>no</th>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1599.502">Network Slice infrastructure resource hijacking</a></td>
<td>no</th>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1599">Network Boundary Bridging</a></td>
<td>no</th>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT5027">Spoof network slice identifier</a></td>
<td>no</th>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT5009">Weaken Integrity</a></td>
<td>no</th>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT5009.001">Radio Interface</a></td>
<td>no</th>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT5009.002">Network Interfaces</a></td>
<td>no</th>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1600.502">Network Interfaces</a></td>
<td>no</th>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1599.505">GTP-U Abuse</a></td>
<td>no</th>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1562">Impair Defenses</a></td>
<td>no</th>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1078">Valid Accounts</a></td>
<td>no</th>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1542">Pre-OS Boot</a></td>
<td>no</th>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1600">Weaken Encryption</a></td>
<td>no</th>
</tr>

</table>

Loading

0 comments on commit f405be3

Please sign in to comment.