Esc
Exploitation for Defense Evasion - T1211
(ATT&CK® Technique)
Definition
Adversaries may exploit a system or application vulnerability to bypass security features. Exploitation of a vulnerability occurs when an adversary takes advantage of a programming error in a program, service, or within the operating system software or kernel itself to execute adversary-controlled code. Vulnerabilities may exist in defensive security software that can be used to disable or circumvent them.
D3FEND Inferred Relationships
Browse the D3FEND knowledge graph by clicking on the nodes below.