The Red Team Vade Mecum
search
Ctrlk
  • The Red Team Vade Mecum
  • Techniques
    • Defense Evasionchevron-right
      • Binary Properties and Code Signing
      • ATA/ATPchevron-right
        • Important Note
        • Intro
        • Lateral Movement
        • Domain Dominance
        • Identification
        • Recon
        • Blocking/Disabling Telemetrychevron-right
      • Tips and Tricks
      • Basicschevron-right
      • Disabling/Patching Telemetrychevron-right
      • Minimizationchevron-right
      • Misdirectionchevron-right
      • Hiding our Payloadschevron-right
      • IPC For Evasion and Control
    • Privilege Escalationchevron-right
    • Enumerationchevron-right
    • Executionchevron-right
    • Initial Accesschevron-right
    • Lateral Movementchevron-right
    • Code Injectionchevron-right
    • Persistencechevron-right
  • Infrastructure
    • SQLchevron-right
  • Other
    • Vulnerability Discoverychevron-right
    • Windows Internalschevron-right
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Techniqueschevron-right
  2. Defense Evasion

ATA/ATP

Important Notechevron-rightIntrochevron-rightLateral Movementchevron-rightDomain Dominancechevron-rightIdentificationchevron-rightReconchevron-rightBlocking/Disabling Telemetrychevron-right
PreviousBinary Properties and Code Signingchevron-leftNextImportant Notechevron-right

Last updated 4 years ago