Skip to content
SynAc
Browse

Terms

Alphabetical index of published term entries. Use the letter rail to jump.

  1. passive attackUpdated Jan 06, 2026

    An actual assault perpetrated by an intentional threat source that attempts to learn or make use of information from a system, but does not attempt to alter the system, its resources, its data, or its operations.

  2. passwordUpdated Jan 06, 2026

    A string of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization.

  3. Password CrackingUpdated Jan 03, 2026

    Adversaries may use password cracking to attempt to recover usable credentials, such as plaintext passwords, when credential material such as password hashes are obtained. OS Credential Dumping can be used to obtain password hashes, this may only get an adversary so far when Pass the Hash is not an option. Further, adversaries may leverage Data from Configuration Repository in order to obtain hashed credentials for network devices.(Citation: US CERT TA18 106A)

  4. Password GuessingUpdated Jan 03, 2026

    Adversaries with no prior knowledge of legitimate credentials within the system or environment may guess passwords to attempt access to accounts. Without knowledge of the password for an account, an adversary may opt to systematically guess the password using a repetitive or iterative mechanism. An adversary may guess login credentials without prior knowledge of system or environment passwords during an operation by using a list of common passwords. Password guessing may or may not take into account the target's policies on password complexity or use policies that may lock accounts out after a number of failed attempts.

  5. passwordlessUpdated Jan 06, 2026

    an authentication method in which a user can log in to a computer system without the entering a password or any other knowledge based secret

  6. Adversaries may execute their own malicious payloads by hijacking environment variables used to load libraries. The PATH environment variable contains a list of directories (User and System) that the OS searches sequentially through in search of the binary that was called from a script or the command line.

  7. penetration testingUpdated Jan 06, 2026

    An evaluation methodology whereby assessors search for vulnerabilities and attempt to circumvent the security features of a network and/or information system.

  8. pen testUpdated Jan 06, 2026

    A colloquial term for penetration test or penetration testing.

  9. Permission Groups DiscoveryUpdated Jan 03, 2026

    Adversaries may attempt to discover group and permission settings. This information can help adversaries determine which user accounts and groups are available, the membership of users in particular groups, and which users and groups have elevated permissions.

  10. The information that permits the identity of an individual to be directly or indirectly inferred.

  11. PhaaSUpdated Jan 06, 2026

    A model where cybercriminals offer pre packaged phishing tools and resources, like malicious email templates, landing pages, and hosting, to others, effectively lowering the barrier to entry for launching phishing campaigns.

  12. PhishingUpdated Jan 06, 2026

    Phishing is a form of social engineering that attempts to trick targets into revealing sensitive information or taking harmful actions.

  13. plaintextUpdated Jan 06, 2026

    Unencrypted information.

  14. Adversaries may modify pluggable authentication modules (PAM) to access user credentials or enable otherwise unwarranted access to accounts. PAM is a modular system of configuration files, libraries, and executable files which guide authentication for many services. The most common authentication module is <code pam unix.so</code , which retrieves, sets, and verifies account authentication information in <code /etc/passwd</code and <code /etc/shadow</code .(Citation: Apple PAM)(Citation: Man Pam Unix)(Citation: Red Hat PAM)

  15. Point & Tag IdentificationUpdated Jan 06, 2026

    Adversaries may collect point and tag values to gain a more comprehensive understanding of the process environment. Points may be values such as inputs, memory locations, outputs or other process specific variables. (Citation: Dennis L. Sloatman September 2016) Tags are the identifiers given to points for operator convenience.

  16. PowerShell ProfileUpdated Jan 03, 2026

    Adversaries may gain persistence and elevate privileges by executing malicious content triggered by PowerShell profiles. A PowerShell profile (<code profile.ps1</code ) is a script that runs when PowerShell starts and can be used as a logon script to customize user environments.

  17. precursorUpdated Jan 06, 2026

    An observable occurrence or sign that an attacker may be preparing to cause an incident.

  18. preparednessUpdated Jan 06, 2026

    The activities to build, sustain, and improve readiness capabilities to prevent, protect against, respond to, and recover from natural or manmade incidents.

  19. Prevent Application RemovalUpdated Jan 06, 2026

    Adversaries may abuse the Android device administration API to prevent the user from uninstalling a target application. In earlier versions of Android, device administrator applications needed their administration capabilities explicitly deactivated by the user before the application could be uninstalled. This was later updated so the user could deactivate and uninstall the administrator application in one step.

  20. privacyUpdated Jan 06, 2026

    The assurance that the confidentiality of, and access to, certain information about an entity is protected.

  21. private keyUpdated Jan 06, 2026

    A cryptographic key that must be kept confidential and is used to enable the operation of an asymmetric (public key) cryptographic algorithm.

  22. Process DiscoveryUpdated Jan 06, 2026

    Adversaries may attempt to get information about running processes on a device. Information obtained could be used to gain an understanding of common software/applications running on devices within a network. Adversaries may use the information from Process Discovery during automated discovery to shape follow on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions.

  23. Process InjectionUpdated Jan 06, 2026

    Adversaries may inject code into processes in order to evade process based defenses or even elevate privileges. Process injection is a method of executing arbitrary code in the address space of a separate live process. Running code in the context of another process may allow access to the process's memory, system/network resources, and possibly elevated privileges. Execution via process injection may also evade detection from security products since the execution is masked under a legitimate process.

  24. Program DownloadUpdated Jan 06, 2026

    Adversaries may perform a program download to transfer a user program to a controller.

  25. Program UploadUpdated Jan 06, 2026

    Adversaries may attempt to upload a program from a PLC to gather information about an industrial process. Uploading a program may allow them to acquire and study the underlying logic. Methods of program upload include vendor software, which enables the user to upload and read a program running on a PLC. This software can be used to upload the target program to a workstation, jump box, or an interfacing device.

  26. Project File InfectionUpdated Jan 06, 2026

    Adversaries may attempt to infect project files with malicious code. These project files may consist of objects, program organization units, variables such as tags, documentation, and other configurations needed for PLC programs to function. (Citation: Beckhoff) Using built in functions of the engineering software, adversaries may be able to download an infected program to a PLC in the operating environment enabling further Execution and Persistence techniques. (Citation: PLCdev)

  27. protect & defendUpdated Jan 06, 2026

    A NICE Framework category consisting of specialty areas responsible for the identification, analysis, and mitigation of threats to internal IT systems or networks.

  28. Protected User DataUpdated Jan 06, 2026

    Adversaries may utilize standard operating system APIs to collect data from permission backed data stores on a device, such as the calendar or contact list. These permissions need to be declared ahead of time. On Android, they must be included in the application’s manifest. On iOS, they must be included in the application’s file.

  29. ProxyjackingUpdated Jan 06, 2026

    a malicious technique where an attacker gains control over a target's proxy server, allowing them to intercept and manipulate the targets internet traffic

  30. Proxy Through VictimUpdated Jan 06, 2026

    Adversaries may use a compromised device as a proxy server to the Internet. By utilizing a proxy, adversaries hide the true IP address of their C2 server and associated infrastructure from the destination of the network traffic. This masquerades an adversary’s traffic as legitimate traffic originating from the compromised device, which can evade IP based restrictions and alerts on certain services, such as bank accounts and social media websites.(Citation: Threat Fabric Exobot)

  31. Ptrace System CallsUpdated Jan 06, 2026

    Adversaries may inject malicious code into processes via ptrace (process trace) system calls in order to evade process based defenses as well as possibly elevate privileges. Ptrace system call injection is a method of executing arbitrary code in the address space of a separate live process.

  32. Public KeyUpdated Jan 06, 2026

    A public key is the publicly shared component of an asymmetric key pair used for encryption or signature verification.

  33. public key cryptographyUpdated Jan 06, 2026

    A branch of cryptography in which a cryptographic system or algorithms use two uniquely linked keys: a public key and a private key (a key pair).

  34. public key infrastructureUpdated Jan 06, 2026

    A framework consisting of standards and services to enable secure, encrypted communication and authentication over potentially insecure networks such as the Internet.

  35. PubPrnUpdated Jan 03, 2026

    Adversaries may use PubPrn to proxy execution of malicious remote files. PubPrn.vbs is a Visual Basic script that publishes a printer to Active Directory Domain Services. The script may be signed by Microsoft and is commonly executed through the Windows Command Shell via <code Cscript.exe</code . For example, the following code publishes a printer within the specified domain: <code cscript pubprn Printer1 LDAP://CN=Container1,DC=Domain1,DC=Com</code .(Citation: pubprn)

  36. Purchase Technical DataUpdated Jan 03, 2026

    Adversaries may purchase technical information about victims that can be used during targeting. Information about victims may be available for purchase within reputable private sources and databases, such as paid subscriptions to feeds of scan databases or other data aggregation services. Adversaries may also purchase information from less reputable sources such as dark web or cybercrime blackmarkets.