Exploitation Analysis

Responsible for identifying access and intelligence collection gaps that can be satisfied through cyber collection and/or preparation activities. Leverages all authorized resources and analytic techniques to penetrate targeted networks.

  • T0591: Perform analysis for target infrastructure exploitation activities
  • T0775: Produce network reconstructions
  • T1012: Expand network access
  • T1013: Conduct technical exploitation of a target
  • T1020: Determine the operational and safety impacts of cybersecurity lapses
  • T1023: Identify critical technology procurement requirements
  • T1026: Determine procurement requirements
  • T1031: Implement intelligence collection requirements
  • T1077: Assess the organization's cybersecurity architecture
  • T1091: Perform authorized penetration testing on enterprise network assets
  • T1096: Perform privacy impact assessments (PIAs)
  • T1107: Evaluate functional requirements
  • T1211: Track targets
  • T1359: Perform penetration testing
  • T1519: Design system security measures
  • T1520: Update system security measures
  • T1563: Implement system security measures
  • T1635: Access targeted networks
  • T1663: Identify potential avenues of access in digital technologies
  • T1667: Conduct independent in-depth target and technical analysis
  • T1677: Develop intelligence collection plans
  • T1689: Create comprehensive exploitation strategies
  • T1690: Identify exploitable technical or operational vulnerabilities
  • T1736: Communicate tool requirements to developers
  • T1745: Identify gaps in understanding of target technology
  • T1751: Locate targets
  • T1757: Coordinate exploitation operations
  • T1758: Determine potential implications of new and emerging hardware and software technologies
  • T1772: Identify indications and warnings of target communication changes or processing failures
  • T1785: Profile network administrators and their activities