API Information Flow Exfiltration
ID: | TEQ-068 |
Phase(s): | Actions on the Objective |
Tactic(s): | Exfiltration |
The adversary gathers and exfiltrates information, such as vulnerabilities and exposures, from API endpoints.
ID: | TEQ-068 |
Phase(s): | Actions on the Objective |
Tactic(s): | Exfiltration |
The adversary gathers and exfiltrates information, such as vulnerabilities and exposures, from API endpoints.