Skip to Content

MITRE ATT&CK

What it is — MITRE ATT&CK is a globally accessible knowledge base of adversary tactics and techniques based on real-world observations, maintained by MITRE Corporation . It categorizes adversary behavior into Tactics (the “why”) and Techniques (the “how”) across the attack lifecycle, from initial reconnaissance through impact. ATT&CK is used for threat modeling, detection engineering, red teaming, and security gap analysis.

Appsec relevance — While ATT&CK covers the full spectrum of adversary behavior, several tactics and techniques are directly relevant to web application and API security — particularly Reconnaissance, Initial Access, and specific Execution techniques that involve exploiting public-facing applications.

How Detectify Maps to MITRE ATT&CK

Detectify’s DAST and ASM capabilities detect or prevent techniques within a subset of ATT&CK tactics. Coverage is strongest for techniques targeting web applications and internet-facing infrastructure.

Reconnaissance (TA0043)

TechniqueWhat it isDetectify CapabilityCoverage
T1595 — Active ScanningAdversary scans victim IP blocks, ports, and services to identify targets and vulnerabilitiesSurface Monitoring replicates attacker reconnaissance — scanning IP ranges, discovering hosts, enumerating subdomains. Gives defenders the same view an attacker would buildFull (defensive)
T1592 — Gather Victim Host InformationAdversary gathers information about victim hosts such as software, hardware, and configuration detailsSurface Monitoring fingerprints technologies, frameworks, versions, and server software on external assets — the same information adversaries collectFull (defensive)
T1593 — Search Open Websites/DomainsAdversary searches freely available websites and domains for information about victimsSurface Monitoring discovers subdomains and associated assets. Does not cover OSINT from social media or code repositoriesPartial (defensive)
T1596 — Search Open Technical DatabasesAdversary searches technical databases (DNS, WHOIS, certificates) for victim informationSurface Monitoring uses DNS, certificate transparency logs, and related data sources for asset discoveryPartial (defensive)

Discovery (TA0007)

TechniqueWhat it isDetectify CapabilityCoverage
T1046 — Network Service DiscoveryAdversary discovers running services on remote hosts to identify exploitable servicesSurface Monitoring discovers and fingerprints all externally running services, giving defenders the same view network service discovery would revealFull (defensive)

Initial Access (TA0001)

TechniqueWhat it isDetectify CapabilityCoverage
T1190 — Exploit Public-Facing ApplicationAdversary exploits a vulnerability in an internet-facing application to gain accessCore Detectify capability: Application Scanning, API Scanning, and Surface Monitoring identify exploitable vulnerabilities in public-facing applications covering multiple CWEsFull
T1078 — Valid AccountsAdversary obtains and uses existing account credentials to gain accessDefault credential detection, authentication bypass testing (CWE-287 , CWE-306 )Partial

Execution (TA0002)

TechniqueWhat it isDetectify CapabilityCoverage
T1059 — Command and Scripting InterpreterAdversary abuses command and script interpreters to execute commands and scriptsOS command injection detection CWE-78 , code injection CWE-94 Full
T1203 — Exploitation for Client ExecutionAdversary exploits software vulnerabilities in client applications to execute codeXSS detection CWE-79  identifies vulnerabilities that enable client-side executionFull

Credential Access (TA0006)

TechniqueWhat it isDetectify CapabilityCoverage
T1212 — Exploitation for Credential AccessAdversary exploits software vulnerabilities to collect credentialsDetects vulnerabilities that could lead to credential theft: information exposure (CWE-200 ), cleartext storage (CWE-312 ), sensitive data in error messages (CWE-209 )Partial

Collection (TA0009)

TechniqueWhat it isDetectify CapabilityCoverage
T1213 — Data from Information RepositoriesAdversary uses information repositories (wikis, databases, file shares) to mine valuable dataDetects exposed information repositories, directory listings (CWE-548 ), and sensitive file exposure (CWE-538 )Partial

What Detectify Covers

Detectify’s strongest ATT&CK alignment is with T1190 — Exploit Public-Facing Application, which is a primary initial access technique used by adversaries. The entire DAST testing suite — Application Scanning, API Scanning, and Internal Scanning — identifies and validates exploitable vulnerabilities before adversaries can use them.

Surface Monitoring provides defensive coverage for Reconnaissance tactics by identifying the same information and assets an adversary would discover, allowing organizations to reduce their exposed attack surface.

Coverage is limited to techniques involving web applications, APIs, and internet-facing infrastructure. ATT&CK techniques targeting endpoints, networks, Active Directory, cloud infrastructure, and other domains are outside DAST scope.

Complementary Tools You May Need

  • EDR / endpoint protection — For Execution, Persistence, and Lateral Movement techniques
  • SIEM — For detection across all ATT&CK tactics
  • Network detection and response (NDR) — For network-based techniques
  • Cloud security posture management (CSPM) — For cloud-specific techniques
  • Identity threat detection — For Credential Access and Privilege Escalation
  • Red teaming / adversary simulation — For comprehensive ATT&CK coverage assessment

References

Last updated on