Esc
Restore Software
Artifact Relationships:
This defensive technique is related to specific artifacts. Click the artifact node for more information.
Related ATT&CK Techniques:
These mappings are inferred, experimental, and will improve as the
knowledge graph grows.
These offensive techniques are determined related because of the way this defensive technique,, .
Lateral Movement
Software Deployment Tools
Privilege Escalation
Boot or Logon Autostart Execution
Event Triggered Execution
Hijack Execution Flow
Impact
Inhibit System Recovery
Persistence
Server Software Component
Pre-OS Boot
Office Application Startup
Software Extensions
Boot or Logon Autostart Execution
Event Triggered Execution
Compromise Host Software Binary
Hijack Execution Flow
Initial Access
Supply Chain Compromise
Execution
Software Deployment Tools
Credential Access
Exploitation for Credential Access
Input Capture
Steal or Forge Authentication Certificates
Defense Evasion
System Binary Proxy Execution
Hide Artifacts
Trusted Developer Utilities Proxy Execution
Rootkit
Pre-OS Boot
Hijack Execution Flow
Virtualization/Sandbox Evasion
References
All
Guideline
The following references were used to develop the Restore Software knowledge-base article.
(Note: the consideration of references does not imply specific functionality exists in an offering.)
Cybersecurity Incident & Vulnerability Response Playbooks
Reference Type: Guideline Organization: Cybersecurity and Infrastructure Security Agency Author: Cybersecurity and Infrastructure Security Agency