A threat actor conducts brute force attacks against SSH services to gain Initial access. This attack technique falls under which category of the Google Workspace MITRE ATT&CK matrix?
I'm going with B. Discovery. They're trying to find out information about the system, even if it's through a brute force attack. Credential access is too specific, in my opinion.
Sheldon
2 months agoQueen
2 months agoMalcolm
1 months agoBarb
1 months agoMarsha
1 months agoDarrel
2 months agoErnest
2 months agoLeila
1 months agoMichal
2 months agoRosio
2 months agoTeresita
2 months agoHerminia
2 months agoMarg
2 months agoPrincess
2 months agoShawnda
2 months agoJulio
2 months agoHarrison
3 months agoRegenia
3 months ago