| Tactic: Intel Gathering |
Tactic: Disturbance |
Tactic: Initial Access |
Tactic: Privilege Escalation |
Tactic: Persistence |
Tactic: Lateral Movement |
Tactic: Impact |
|---|---|---|---|---|---|---|
| Identify Platform | Deauth Wireless Protocol | Default Credentials | Modify Control Logic | OS Specific | Through (Custom) Communication Protocol | Eavesdrop |
| Scan Radio Frequencies | Jam Radio Frequency | Wifi Cracking | ROS Specific | Through Subsystem | Tamper Control Logic | |
| Service Scanning | Sensor Tampering | Known Vulnerabilities | OS Specific | Denial Of Control | ||
| Trigger Safety Measure | Physically Access Controller | Denial Of Availability | ||||
| Hardware Factory Reset | Supply Chain Compromise | Tamper With Safety System | ||||
| Electro Magnetic Pulse | Access Hardware Interfaces | Software Factory Reset | ||||
| Environmental Challenge | Compromise Controller | Control OS | ||||
| Physically Power Off or Reset | ||||||
| Software Power Off or Reset | ||||||
| Replay Controller Traffic |
| Legend |
|---|
| Validated |
| Not yet validated |