A threat actor conducts brute force attacks against SSH services to gain Initial access. This attack technique falls under which category of the Google Workspace MITRE ATT&CK matrix?
I'm going with B. Discovery. They're trying to find out information about the system, even if it's through a brute force attack. Credential access is too specific, in my opinion.
Sheldon
3 months agoQueen
3 months agoMalcolm
3 months agoBarb
3 months agoMarsha
3 months agoDarrel
4 months agoErnest
4 months agoLeila
3 months agoMichal
3 months agoRosio
3 months agoTeresita
3 months agoHerminia
4 months agoMarg
4 months agoPrincess
3 months agoShawnda
3 months agoJulio
4 months agoHarrison
4 months agoRegenia
4 months ago