Skip to content
SynAc
Browse

Terms

Alphabetical index of published term entries. Use the letter rail to jump.

  1. SAML TokensUpdated Jan 03, 2026

    An adversary may forge SAML tokens with any permissions claims and lifetimes if they possess a valid SAML token signing certificate.(Citation: Microsoft SolarWinds Steps) The default lifetime of a SAML token is one hour, but the validity period can be specified in the <code NotOnOrAfter</code value of the <code conditions ...</code element in a token. This value can be changed using the <code AccessTokenLifetime</code in a <code LifetimeTokenPolicy</code .(Citation: Microsoft SAML Token Lifetimes) Forged SAML tokens enable adversaries to authenticate across services that use SAML 2.0 as an SSO (single sign on) mechanism.(Citation: Cyberark Golden SAML)

  2. scarewareUpdated Jan 06, 2026

    a cyberattack tactic that scares people into visiting spoofed or infected websites or downloading malicious software (malware)

  3. Scheduled TaskUpdated Jan 03, 2026

    Adversaries may abuse the Windows Task Scheduler to perform task scheduling for initial or recurring execution of malicious code. There are multiple ways to access the Task Scheduler in Windows. The schtasks utility can be run directly on the command line, or the Task Scheduler can be opened through the GUI within the Administrator Tools section of the Control Panel.(Citation: Stack Overflow) In some cases, adversaries have used a .NET wrapper for the Windows Task Scheduler, and alternatively, adversaries have used the Windows netapi32 library and Windows Management Instrumentation (WMI) to create a scheduled task. Adversaries may also utilize the Powershell Cmdlet , which leverages WMI class to create a scheduled task via an XML path.(Citation: Red Canary Atomic Red Team)

  4. Scheduled Task/JobUpdated Jan 06, 2026

    Adversaries may abuse task scheduling functionality to facilitate initial or recurring execution of malicious code. On Android and iOS, APIs and libraries exist to facilitate scheduling tasks to execute at a specified date, time, or interval.

  5. Screen CaptureUpdated Jan 06, 2026

    Adversaries may attempt to take screen captures of the desktop to gather information over the course of an operation. Screen capturing functionality may be included as a feature of a remote access tool used in post compromise operations. Taking a screenshot is also typically possible through native utilities or API calls, such as <code CopyFromScreen</code , <code xwd</code , or <code screencapture</code .(Citation: CopyFromScreen .NET)(Citation: Antiquated Mac Malware)

  6. ScriptingUpdated Jan 06, 2026

    Adversaries may use scripting languages to execute arbitrary code in the form of a pre written script or in the form of user supplied code to an interpreter. Scripting languages are programming languages that differ from compiled languages, in that scripting languages use an interpreter, instead of a compiler. These interpreters read and compile part of the source code just before it is executed, as opposed to compilers, which compile each and every line of code to an executable file. Scripting allows software developers to run their code on any system where the interpreter exists. This way, they can distribute one package, instead of precompiling executables for many different systems. Scripting languages, such as Python, have their interpreters shipped as a default with many Linux distributions.

  7. Search Victim-Owned WebsitesUpdated Jan 03, 2026

    Adversaries may search websites owned by the victim for information that can be used during targeting. Victim owned websites may contain a variety of details, including names of departments/divisions, physical locations, and data about key employees such as names, roles, and contact info (ex: Email Addresses). These sites may also have details highlighting business operations and relationships.(Citation: Comparitech Leak)

  8. SecDevOpsUpdated Jan 06, 2026

    a software development methodology that places security concerns first in planning and development

  9. SecOpsUpdated Jan 06, 2026

    a combination of the terms security and operations, is a methodology that IT managers implement to enhance the connection, collaboration and communication between IT security and IT operations teams

  10. secret keyUpdated Jan 06, 2026

    A cryptographic key that is used for both encryption and decryption, enabling the operation of a symmetric key cryptography scheme.

  11. securely provisionUpdated Jan 06, 2026

    A NICE Framework category consisting of specialty areas concerned with conceptualizing, designing, and building secure IT systems, with responsibility for some aspect of the systems' development.

  12. Security Account ManagerUpdated Jan 03, 2026

    Adversaries may attempt to extract credential material from the Security Account Manager (SAM) database either through in memory techniques or through the Windows Registry where the SAM database is stored. The SAM is a database file that contains local accounts for the host, typically those found with the <code net user</code command. Enumerating the SAM database requires SYSTEM level access.

  13. security automationUpdated Jan 06, 2026

    The use of information technology in place of manual processes for cyber incident response and management.

  14. Securityd MemoryUpdated Jan 03, 2026

    An adversary with root access may gather credentials by reading ’s memory. is a service/daemon responsible for implementing security protocols such as encryption and authorization.(Citation: Apple Dev SecurityD) A privileged adversary may be able to scan through 's memory to find the correct sequence of keys to decrypt the user’s logon keychain. This may provide the adversary with various plaintext passwords, such as those for users, WiFi, mail, browsers, certificates, secure notes, etc.(Citation: OS X Keychain)(Citation: OSX Keydnap malware)

  15. security policyUpdated Jan 06, 2026

    A rule or set of rules that govern the acceptable use of an organization's information and services to a level of acceptable risk and the means for protecting the organization's information assets.

  16. security program managementUpdated Jan 06, 2026

    In the NICE Framework, cybersecurity work where a person: Manages information security (e.g., information security) implications within the organization, specific program, or other area of responsibility, to include strategic, personnel, infrastructure, policy enforcement, emergency planning, security awareness, and other resources (e.g., the role of a Chief Information Security Officer).

  17. Security Software DiscoveryUpdated Jan 06, 2026

    Adversaries may attempt to get a listing of security applications and configurations that are installed on a device. This may include things such as mobile security products. Adversaries may use the information from Security Software Discovery during automated discovery to shape follow on behaviors, including whether or not to fully infect the target and/or attempt specific actions.

  18. ServerlessUpdated Jan 03, 2026

    Adversaries may purchase and configure serverless cloud infrastructure, such as Cloudflare Workers, AWS Lambda functions, or Google Apps Scripts, that can be used during targeting. By utilizing serverless infrastructure, adversaries can make it more difficult to attribute infrastructure used during operations back to them.

  19. Adversaries may execute their own malicious payloads by hijacking the Registry entries used by services. Flaws in the permissions for Registry keys related to services can allow adversaries to redirect the originally specified executable to one they control, launching their own code when a service starts. Windows stores local service configuration information in the Registry under <code HKLM\SYSTEM\CurrentControlSet\Services</code . The information stored under a service's Registry keys can be manipulated to modify a service's execution parameters through tools such as the service controller, sc.exe, PowerShell, or Reg. Access to Registry keys is controlled through access control lists and user permissions. (Citation: Registry Key Security)(Citation: malware hides service)

  20. Service StopUpdated Jan 06, 2026

    Adversaries may stop or disable services on a system to render those services unavailable to legitimate users. Stopping critical services or processes can inhibit or stop response to an incident or aid in the adversary's overall objectives to cause damage to the environment.(Citation: Talos Olympic Destroyer 2018)(Citation: Novetta Blockbuster)

  21. Shared ModulesUpdated Jan 03, 2026

    Adversaries may execute malicious payloads via loading shared modules. Shared modules are executable files that are loaded into processes to provide access to reusable code, such as specific custom functions or invoking OS API functions (i.e., Native API).

  22. SharepointUpdated Jan 03, 2026

    Adversaries may leverage the SharePoint repository as a source to mine valuable information. SharePoint will often contain useful information for an adversary to learn about the structure and functionality of the internal network and systems. For example, the following is a list of example information that may hold potential value to an adversary and may also be found on SharePoint:

  23. signatureUpdated Jan 06, 2026

    A recognizable, distinguishing pattern.

  24. SIM Card SwapUpdated Jan 06, 2026

    Adversaries may gain access to mobile devices through transfers or swaps from victims’ phone numbers to adversary controlled SIM cards and mobile devices.(Citation: ATT SIM Swap Scams)(Citation: Verizon SIM Swapping)

  25. Single Sign-onUpdated Jan 06, 2026

    Single sign on (SSO) allows a user to authenticate once and access multiple services without re authenticating.

  26. situational awarenessUpdated Jan 06, 2026

    Comprehending information about the current and developing security posture and risks, based on information gathered, observation and analysis, and knowledge or experience.

  27. SlowLorisUpdated Jan 06, 2026

    an attack tool designed to take down a server by flooding it with incomplete HTTP requests, without using much of bandwidth

  28. smishingUpdated Jan 06, 2026

    the fraudulent practice of sending text messages purporting to be from reputable companies in order to induce individuals to reveal personal information

  29. SMS ControlUpdated Jan 06, 2026

    Adversaries may delete, alter, or send SMS messages without user authorization. This could be used to hide C2 SMS messages, spread malware, or various external effects.

  30. SMS MessagesUpdated Jan 06, 2026

    Adversaries may utilize standard operating system APIs to gather SMS messages. On Android, this can be accomplished using the SMS Content Provider. iOS provides no standard API to access SMS messages.

  31. SMS PumpingUpdated Jan 03, 2026

    Adversaries may leverage messaging services for SMS pumping, which may impact system and/or hosted service availability.(Citation: Twilio SMS Pumping) SMS pumping is a type of telecommunications fraud whereby a threat actor first obtains a set of phone numbers from a telecommunications provider, then leverages a victim’s messaging infrastructure to send large amounts of SMS messages to numbers in that set. By generating SMS traffic to their phone number set, a threat actor may earn payments from the telecommunications provider.(Citation: Twilio SMS Pumping Fraud)

  32. Social EngineeringUpdated Jan 06, 2026

    the use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes

  33. Socket FiltersUpdated Jan 03, 2026

    Adversaries may attach filters to a network socket to monitor then activate backdoors used for persistence or command and control. With elevated permissions, adversaries can use features such as the library to open sockets and install filters to allow or disallow certain types of data to come through the socket. The filter may apply to all traffic passing through the specified network interface (or every interface if not specified). When the network interface receives a packet matching the filter criteria, additional actions can be triggered on the host, such as activation of a reverse shell.

  34. software assuranceUpdated Jan 06, 2026

    The level of confidence that software is free from vulnerabilities, either intentionally designed into the software or accidentally inserted at any time during its lifecycle, and that the software functions in the intended manner.

  35. In the NICE Framework, cybersecurity work where a person: Develops and writes/codes new (or modifies existing) computer applications, software, or specialized utility programs following software assurance best practices.

  36. Software DiscoveryUpdated Jan 06, 2026

    Adversaries may attempt to get a listing of applications that are installed on a device. Adversaries may use the information from Software Discovery during automated discovery to shape follow on behaviors, including whether or not to fully infect the target and/or attempts specific actions.

  37. Software PackingUpdated Jan 06, 2026

    Adversaries may perform software packing to conceal their code. Software packing is a method of compressing or encrypting an executable. Packing an executable changes the file signature in an attempt to avoid signature based detection. Most decompression techniques decompress the executable code in memory.

  38. spamUpdated Jan 06, 2026

    The abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages.

  39. SpearphishUpdated Jan 06, 2026

    a malicious attack, spear phishing is a targeted form of phishing that uses personalized emails or messages to trick a specific individual or organization into revealing sensitive information or downloading malware

  40. Spearphishing AttachmentUpdated Jan 06, 2026

    Adversaries may use a spearphishing attachment, a variant of spearphishing, as a form of a social engineering attack against specific targets. Spearphishing attachments are different from other forms of spearphishing in that they employ malware attached to an email. All forms of spearphishing are electronically delivered and target a specific individual, company, or industry. In this scenario, adversaries attach a file to the spearphishing email and usually rely upon User Execution to gain execution and access. (Citation: Enterprise ATT&CK October 2019)

  41. SpideringUpdated Jan 06, 2026

    the process where hackers familiarize themselves with their targets in order to obtain credentials based on their activity

  42. spoofingUpdated Jan 06, 2026

    Faking the sending address of a transmission to gain illegal [unauthorized] entry into a secure system.

  43. Spoof Reporting MessageUpdated Jan 06, 2026

    Adversaries may spoof reporting messages in control system environments for evasion and to impair process control. In control systems, reporting messages contain telemetry data (e.g., I/O values) pertaining to the current state of equipment and the industrial process. Reporting messages are important for monitoring the normal operation of a system or identifying important events such as deviations from expected values.

  44. spywareUpdated Jan 06, 2026

    Software that is secretly or surreptitiously installed into an information system without the knowledge of the system user or owner.

  45. SSL PinningUpdated Jan 06, 2026

    Adversaries may use SSL Pinning to protect the C2 traffic from being intercepted and analyzed.

  46. Adversaries may establish command and control capabilities over commonly used application layer protocols such as HTTP(S), OPC, RDP, telnet, DNP3, and modbus. These protocols may be used to disguise adversary actions as benign network traffic. Standard protocols may be seen on their associated port or in some cases over a non standard port. Adversaries may use these protocols to reach out of the network for command and control, or in some cases to other infected devices within the network.

  47. Standard EncodingUpdated Jan 03, 2026

    Adversaries may encode data with a standard data encoding system to make the content of command and control traffic more difficult to detect. Command and control (C2) information can be encoded using a standard data encoding system that adheres to existing protocol specifications. Common data encoding schemes include ASCII, Unicode, hexadecimal, Base64, and MIME.(Citation: Wikipedia Binary to text Encoding)(Citation: Wikipedia Character Encoding) Some data encoding systems may also result in data compression, such as gzip.

  48. Steal Application Access TokenUpdated Jan 06, 2026

    Adversaries can steal user application access tokens as a means of acquiring credentials to access remote systems and resources. This can occur through social engineering or URI hijacking and typically requires user action to grant access, such as through a system “Open With” dialogue.

  49. Steal Web Session CookieUpdated Jan 03, 2026

    An adversary may steal web application or service session cookies and use them to gain access to web applications or Internet services as an authenticated user without needing credentials. Web applications and services often use session cookies as an authentication token after a user has authenticated to a website.

  50. SteganographyUpdated Jan 06, 2026

    Adversaries may use steganography techniques in order to prevent the detection of hidden information. Steganographic techniques can be used to hide data in digital media such as images, audio tracks, video clips, or text files.