Present the adversary with a variety of installed applications and services.
Application diversity is presenting multiple software targets to the adversary. On a single target system, defenders can configure multiple different services or user software applications. On a target network, defenders can present systems with a variety of operating systems, operating system versions, applications, and services.
|There is an opportunity to study the adversary and collect first-hand observations about them and their tools.
|There is an opportunity to discover who or what is being targeting by an adversary.
|In an adversary engagement scenario, there is an opportunity to use a variety of applications on a system to see what an adversary tries to exploit in order to acquire credentials.
|There is an opportunity to provide a variety of applications to an adversary so they see a full set of information when performing discovery tasks.
|There is an opportunity to provide a variety of applications to an adversary to see what things an adversary prefers or to influence their operations.
|A defender can install one or more applications on a decoy system with a variety of patch levels to see how an adversary might exploit those applications.
|A defender can install decoy services that have extensible capabilities.
|A defender can plant AV or monitoring tools which are easy for an adversary to remove. If an adversary removes these, they may be enticed to act more openly believing they have removed monitoring from the system.
|A defender can use a variety of applications on a decoy system or in a decoy network to see what an adversary tries to exploit in order to acquire credentials.
|During an adversary engagement operation, a defender can open and use any particular subset of applications installed on a system to control what is presented to the adversary at any point in time.
|A defender can stand up decoy systems or processes using a wide array of applications. These applications can be hardened to test an adversary's capabilities, or easily exploited to entice an adversary to move in that direction.
|A defender can install an array of various software packages on a system to make it look used and populated. This will give an adversary a collection of software to interact with and possibly expose additional techniques.
|Use a mix of vulnerable and nonvulnerable software on a system to allow you to see what exploits the adversary leverages in their attacks.
|Install Anti-virus or other end-point detection tools on systems to see if an adversary takes note of them and if so, how they react.
|Application Window Discovery
|Exploitation for Client Execution
|Exploitation of Remote Services
|Exploitation for Defense Evasion
|Exploitation for Credential Access
|Server Software Component