◆ SECMONS
Dashboard Vulnerabilities Threat Actors Malware Attack Techniques Breaches Scams Research Guides News Glossary
SECMONS
Dashboard Vulnerabilities Threat Actors Malware Attack Techniques Breaches Scams Research Guides News Glossary
Home / Attack Techniques

Attack Techniques

Technique library aligned to MITRE ATT&CK.

Credential Dumping — Post-Exploitation Identity Compromise Technique
Credential dumping is a post-exploitation technique used to extract authentication material from compromised systems. This SECMONS record explains how credential dumping works, its role in enterprise intrusions, and defensive detection strategies.
Data Exfiltration — Enterprise Data Theft & Extortion Technique
Data exfiltration is the unauthorized transfer of data from a compromised environment. This SECMONS record explains common exfiltration patterns, its role in ransomware operations, and defensive containment strategies.
Phishing — Enterprise Credential Harvesting & Initial Access Technique
Phishing is a social engineering technique used to obtain credentials, deliver malware, or establish initial access into enterprise environments. This SECMONS record explains phishing mechanics, campaign evolution, and defensive controls.
Vulnerability filters
  • All vulnerabilities
  • Zero-day
  • Exploited in the wild
  • RCE
  • Privilege escalation
Filters are tag-based for now. Later we’ll add real faceted filters.
Facts
Created
2026-02-25

Legal & Policies

  • Terms of Service (TOS)
  • Privacy Policy
  • Cookie Policy
  • Disclaimer
  • Affiliate Disclosure

Governance

  • Vulnerability Policy
  • Editorial Policy
  • Ethics & Governance
  • Methodology

Research & Intelligence

  • Research
  • Threat Actors
  • Zero-Day Tracker
  • Exploit Database
  • Reports

Resources

  • Resources
  • Sitemap
  • RSS

Company

  • Meet the Experts / Authors
  • About Us
  • Contact & Press
  • Careers / Join Us
© 2026 SECMONS. All rights reserved.
CtrlK
Search the site.