Make changes to network properties and functions to achieve a desired effect.
Network Manipulation allows a defender to throttle network speeds, segment the network, maintain a unique IP addressing scheme, or add a kill switch to cut off network access if needed.
| ID | Description |
|---|---|
| DOS0130 | There is an opportunity to alter the network configuration in order to disrupt an adversary who is trying to saturate the network or a system via denial of service. |
| DOS0159 | There is an opportunity to manipulate the network to allow/deny certain types of traffic, to degrade network traffic, or otherwise impact an adversary's activity. |
| DOS0164 | There is an opportunity to block an adversary that is seeking to use a proxied connection. |
| DOS0174 | There is an opportunity to disrupt or enable and adversary's exfiltration activities by blocking/unblocking the traffic to their Command and Control (C2) location. |
| DOS0246 | An adversary may attempt to dynamically determine the C2 address to communicate with. This gives a defender an opportunity to discover additional infrastructure. |
| ID | Description |
|---|---|
| DUC0126 | A defender can configure network devices to analyze network traffic, detect a potential DoS attack, and make appropriate adjustments to mitigate the situation. |
| DUC0152 | A defender could allow or deny outbound SMB requests from a network to affect the success of forced authentication. Alternative a defender could redirect outbound SMB requests to a decoy system to thwart attempted credential theft |
| DUC0153 | A defender can identify and block specific adversary Command and Control (C2) traffic to see how an adversary responds, possibly exposing additional C2 information. |
| DUC0158 | A defender can block certain adversary used protocols used between systems in order to prevent lateral tool transfer. |
| DUC0161 | A defender could implement a protocol aware IPS to limit systems communicating to unknown locations on the internet. |
| DUC0164 | A defender could block traffic to known anonymity networks and C2 infrastructure through the use of network allow and block lists. |
| DUC0174 | A defender can prevent or enable use of alternate protocols for exfiltration by blocking/unblocking unnecessary ports and protocols. |
| DUC0175 | A defender can restrict network traffic making adversary exfiltration slow or unreliable. |
| DUC0246 | A defender can block primary C2 domains and IPs to determine if the malware or adversary has the ability to reach out to additional infrastructure. |
| ID | Description |
|---|---|
| DPR0045 | Add a kill switch to a decoy network that can be used to shutdown all network communication if an adversary takes an action that is out of the desired scope. |
| DPR0046 | Introduce intermittent network packet loss on a decoy network to interfere with an adversary's activities. |
ID![]() | Name | ATT&CK Tactics |
|---|---|---|
| T1008 | Fallback Channels | Command and Control |
| T1041 | Exfiltration Over C2 Channel | Exfiltration |
| T1048 | Exfiltration Over Alternative Protocol | Exfiltration |
| T1090 | Proxy | Command and Control |
| T1104 | Multi-Stage Channels | Command and Control |
| T1187 | Forced Authentication | Credential Access |
| T1498 | Network Denial of Service | Impact |
| T1499 | Endpoint Denial of Service | Impact |
| T1568 | Dynamic Resolution | Command and Control |
| T1570 | Lateral Tool Transfer | Lateral Movement |