Back to Floor
Attack Tactics • Room 3
Mapping TTPs
Tactics, Techniques, and Procedures (TTPs) describe how an adversary operates. The MITRE ATT&CK framework standardizes these descriptions.
Instead of hunting for an ever-changing file hash (Tactical), hunting for the *behavior* of credential dumping (Operational) is much more robust against adversary evasion.
Knowledge Check
Prove your understanding to clear the room (Rewards XP)
Question 1 of 1
Why is hunting for TTPs generally considered more effective than hunting for simple IOCs like IP addresses?