A threat actor conducts brute force attacks against SSH services to gain Initial access. This attack technique falls under which category of the Google Workspace MITRE ATT&CK matrix?
I'm going with B. Discovery. They're trying to find out information about the system, even if it's through a brute force attack. Credential access is too specific, in my opinion.
Sheldon
4 months agoQueen
4 months agoMalcolm
4 months agoBarb
4 months agoMarsha
4 months agoDarrel
5 months agoErnest
5 months agoLeila
4 months agoMichal
4 months agoRosio
4 months agoTeresita
4 months agoHerminia
5 months agoMarg
5 months agoPrincess
4 months agoShawnda
4 months agoJulio
5 months agoHarrison
5 months agoRegenia
5 months ago