- AR4
- -IF009
- -IF009.006
Installing Crypto Mining Software - AR4
Contributor: The ITM Team @ - Subsection IF009.006
- AR4
- -IF014
- -IF014.007
Creation of Cloud Resources - AR4
Contributor: The ITM Team @ - Subsection IF014.007
- AR3
- -PR026
- -PR026.001
Remote Desktop (RDP) Access on Windows Systems - AR3
Contributor: The ITM Team @ - Subsection PR026.001
- AR3
- -PR027
- -PR027.002
Impersonation via Collaboration and Communication Tools - AR3
Contributor: The ITM Team @ - Subsection PR027.002
- AR3
- -PR027
- -PR027.003
Physical Impersonation Through Dress, Uniforms, or Appearance - AR3
Contributor: The ITM Team @ - Subsection PR027.003
- AR3
- -PR027
- -PR027.004
Cloning or Forging ID Cards for Physical Access - AR3
Contributor: The ITM Team @ - Subsection PR027.004
- AR5
- -AF022
- -AF022.001
Use of a Virtual Machine - AR5
Contributor: The ITM Team @ - Subsection AF022.001
- AR5
- -AF022
- -AF022.003
Portable Hypervisors - AR5
Contributor: The ITM Team @ - Subsection AF022.003
- AR5
- -AF022
- -AF022.004
Snapshots and Rollbacks to Remove Evidence - AR5
Contributor: The ITM Team @ - Subsection AF022.004
- AR4
- -IF022
- -IF022.005
Media Leak - AR4
Contributor: The ITM Team @ - Subsection IF022.005