Skip to content

Application Attack Matrix

* Purple - sourced from MITRE ATT&CK

Pre-Intrusion Intrusion Post-Intrusion Impact
Reconnaissance Resource Development Impact
Application API Specification Harvesting Compromised Code Signing and Build Infrastructure Authentication Bypass Execution Using Standard Applicative Flow C2 over App‑Protocols Cloud Service Discovery Service Disruption
Application Dependencies Mapping Develop Capabilities Content Injection (Network traffic) Injection Exploitations Disable Runtime Protection Service Exploitation for Credential Access Data Destruction
Gather Application Configuration Information Obtain Capabilities External Remote Services Remote Code Execution Exploitation Exploitation for Defense Evasion Exploitation of Remote Services Data Manipulation
Public Source Code and Artifacts Analysis Third‑Party Dependency Poisoning Service Standard API Request Forgery Exploitation for Privilege Escalation Service‑to‑Service Trust Abuse Data Encryption
Reverse Engineering Supply Chain Compromise Implant Internal Image Data Exfiltration
Valid Accounts Masquerading Business Logic Manipulation
Scheduled Task Resource Hijacking
Server Software Component Defacement
Disclaimer

Application Security Tactics & Techniques Matrix is a community initiative to educate readers on the potential of application-level tactics, techniques, and procedures (TTPs). It is not to teach how to weaponize or specifically abuse them.