TacticNetwork Effects

Network Effects

Network Effects consists of techniques that adversaries use to exploit environments that allow systems to communicate with each other. Networked environments often include a security boundary that allows communications with systems inside and outside of a protected network. In these cases, adversaries may gain initial access to a network via a single point of compromise, but can then leverage network effects to compromise additional assets in the environment.

Platforms

Windows
Linux
macOS

Attack Perspective

Post-Compromise

Impact Severity

High

Detection Complexity

Medium

Techniques

T1498Network Denial of Service

Adversaries may perform Network Denial of Service (DoS) attacks to degrade or block the availability of targeted resources to users. Network DoS can be performed by exhausting the network bandwidth services rely on. Example resources include specific websites, email services, DNS, and web-based applications.

T1498.001Direct Network Flood

Adversaries may attempt to cause a denial of service by directly sending a high-volume of network traffic to a target. Direct Network Floods are when one or more systems are used to send a high-volume of network packets towards the targeted service's network.

T1498.002Reflection Amplification

Adversaries may attempt to cause a denial of service by reflecting a high-volume of network traffic to a target. This type of Network DoS takes advantage of a third-party server intermediary that hosts and will respond to a given spoofed source IP address.

Loading problems...