[ MITRE ATT&CK Stacks ]

Advanced threat simulation


Stacks in this section give you an effective way to practice MITRE ATT&CK TTPs through a high degree emulation of the target infrastructure. You get the real experience of an adversary. The scenarios are based on MITRE & ATTACK matrix. Learn more about stacks
18 Exfiltration - 02
18 Exfiltration - 02
Beginner
  • Protocol Impersonation
  • Stealth Exfiltration
  • Stealth Exfiltration
17 Discovery - Linux
17 Discovery - Linux
Beginner
  • Process Discovery
  • Threat Detection
  • Integrity Verification
16 File Analysis - Linux
16 File Analysis - Linux
Beginner
  • File Analysis
  • Threat Detection
  • Integrity Verification
15 Defense Evasion - Network
15 Defense Evasion - Network
Intermediate
  • Port Manipulation
  • Session Splicing
  • Payload Obfuscation
  • Route Manipulation
14 Command & Control - Armitage
14 Command & Control - Armitage
Beginner
  • C2 Environment
  • Create and Manage Listeners
  • Perform Host Enumeration
13 Credential Access - Password Cracking
13 Credential Access - Password Cracking
Beginner
  • Understand Hashes
  • Apply Unshadowing
  • Simulate an Attacker’s Approach
12 Privilege Escalation - MySQL
12 Privilege Escalation - MySQL
Intermediate
  • Understand MySQL Vulnerabilities
  • Exploit Vulnerabilities with Metasploit
  • Simulate an Attacker’s Approach
11 Initial Access - Wordpress
11 Initial Access - Wordpress
Beginner
  • Understand WordPress Vulnerabilities
  • Exploit Vulnerabilities with Metasploit
  • Simulate an Attacker’s Approach
10 Persistence - Linux
10 Persistence - Linux
Beginner
  • Understand Persistence Mechanisms
  • Identify and Mitigate Unauthorized Access
  • Inject SSH Keys
09 Execution - x86_64 Assembly
09 Execution - x86_64 Assembly
Beginner
  • Explore stack manipulation
  • Practice conditional branching
08 Execution - buffer overflow
08 Execution - buffer overflow
Beginner
  • Enumeration and execution
  • Gain hands-on experience with industry-standard cybersecurity tools
02 Reconnaissance - Passive
02 Reconnaissance - Passive
Beginner
  • Enumeration and reconnaissance
  • Gain hands-on experience with industry-standard cybersecurity tools
07 Resource Development - 1
07 Resource Development - 1
Intermediate
  • Pentesting strategies and tactics
  • Enumeration and reconnaissance
  • Gain hands-on experience with industry-standard cybersecurity tools
05 Reconnaissance - Target
05 Reconnaissance - Target
Intermediate
  • Pentesting strategies and tactics
  • Enumeration and reconnaissance
  • Gain hands-on experience with industry-standard cybersecurity tools
04 Reconnaissance - OSINT
04 Reconnaissance - OSINT
Beginner
  • Enumeration and reconnaissance
  • Gain hands-on experience with industry-standard cybersecurity tools
01 Networking 101
01 Networking 101
Beginner
  • Network Fundamentals
  • Reconnaissance
03 Reconnaissance - Network
03 Reconnaissance - Network
Beginner
  • Pentesting strategies and tactics
  • Enumeration and reconnaissance