Skip to content

M0950 Exploit Protection

Use capabilities to detect and block conditions that may lead to or be indicative of a software exploit occurring.

Item Value
ID M0950
Version 1.0
Created 11 June 2019
Last Modified 30 March 2023
Navigation Layer View In ATT&CK® Navigator

Techniques Addressed by Mitigation

Domain ID Name Use
ics T0817 Drive-by Compromise Utilize exploit protection to prevent activities which may be exploited through malicious web sites.
ics T0819 Exploit Public-Facing Application Web Application Firewalls may be used to limit exposure of applications to prevent exploit traffic from reaching the application. 3
ics T0820 Exploitation for Evasion Security applications that look for behavior used during exploitation such as Windows Defender Exploit Guard (WDEG) and the Enhanced Mitigation Experience Toolkit (EMET) can be used to mitigate some exploitation behavior. 1 Control flow integrity checking is another way to potentially identify and stop a software exploit from occurring. 2 Many of these protections depend on the architecture and target application binary for compatibility and may not work for all software or services targeted.
ics T0890 Exploitation for Privilege Escalation Security applications that look for behavior used during exploitation such as Windows Defender Exploit Guard (WDEG) and the Enhanced Mitigation Experience Toolkit (EMET) can be used to mitigate some exploitation behavior. 1 Control flow integrity checking is another way to potentially identify and stop a software exploit from occurring. 2 Many of these protections depend on the architecture and target application binary for compatibility and may not work for all software or services targeted.
ics T0866 Exploitation of Remote Services Security applications that look for behavior used during exploitation such as Windows Defender Exploit Guard (WDEG) and the Enhanced Mitigation Experience Toolkit (EMET) can be used to mitigate some exploitation behavior. 1 Control flow integrity checking is another way to potentially identify and stop a software exploit from occurring. 2 Many of these protections depend on the architecture and target application binary for compatibility and may not work for all software or services targeted.

References