API Information Flow Exfiltration
| ID: | TEQ-068 |
| Phase(s): | Actions on the Objective |
| Tactic(s): | Exfiltration |
The adversary gathers and exfiltrates information, such as vulnerabilities and exposures, from API endpoints.
| ID: | TEQ-068 |
| Phase(s): | Actions on the Objective |
| Tactic(s): | Exfiltration |
The adversary gathers and exfiltrates information, such as vulnerabilities and exposures, from API endpoints.