Skip to content

T1428 Exploit Enterprise Resources

Adversaries may attempt to exploit enterprise servers, workstations, or other resources over the network. This technique may take advantage of the mobile device’s access to an internal enterprise network either through local connectivity or through a Virtual Private Network (VPN).

Item Value
ID T1428
Sub-techniques
Tactics TA0033
Platforms Android, iOS
Version 1.0
Created 25 October 2017
Last Modified 17 October 2018

Procedure Examples

ID Name Description
S0300 DressCode DressCode sets up a “general purpose tunnel” that can be used by an adversary to compromise enterprise networks that the mobile device is connected to.1
S0299 NotCompatible NotCompatible has the capability to exploit systems on an enterprise network.2

References

Back to top