- AR3
- -PR006
- -PR006.003
Security Enumeration via File System - AR3
Contributor: The ITM Team @ - Subsection PR006.003
- AR4
- -IF001
- -IF001.001
Exfiltration via Cloud Storage - AR4
Contributor: The ITM Team @ - Subsection IF001.001
- AR4
- -IF001
- -IF001.002
Exfiltration via Code Repository - AR4
Contributor: The ITM Team @ - Subsection IF001.002
- AR4
- -IF001
- -IF001.003
Exfiltration via Text Storage Sites - AR4
Contributor: The ITM Team @ - Subsection IF001.003
- AR4
- -IF001
- -IF001.004
Exfiltration via Webhook - AR4
Contributor: The ITM Team @ - Subsection IF001.004
- AR4
- -IF002
- -IF002.001
Exfiltration via USB Mass Storage Device - AR4
Contributor: The ITM Team @ - Subsection IF002.001
- AR4
- -IF002
- -IF002.002
Exfiltration via Physical Access to System Drive - AR4
Contributor: The ITM Team @ - Subsection IF002.002
- AR4
- -IF002
- -IF002.003
Exfiltration via New Internal Drive - AR4
Contributor: The ITM Team @ - Subsection IF002.003
- AR4
- -IF002
- -IF002.004
Exfiltration via Floppy Disk - AR4
Contributor: The ITM Team @ - Subsection IF002.004
- AR4
- -IF003
- -IF003.001
Exfiltration via Photography - AR4
Contributor: The ITM Team @ - Subsection IF003.001