| Virual Oral Presentation Slide by Slide |
IEEE/ICACT20230048 Slide.13
[Big Slide]
[YouTube] |
Oral Presentation |
|
|
We can see, Cluster 1 is Download malicious file£¬so its Tactic is Execution and its Subtechnique is Command and Scripting Interpreter. Cluster 2 is try to find information about the system£¬so its Tactic is Discovery and its Subtechnique is Account Discovery (Local Account). Cluster 3 is Brute force£¬so its Tactic is Credential Access and its Subtechnique is Brute Force. | |
| [Go to Next Slide] |