APromptRiskDBThreat intelligence atlas
ATT&CK AI Context

TA0002 - Execution

The adversary is trying to run malicious code. Execution consists of techniques that result in adversary-controlled code running on a local or remote system. Techniques that run malicious code are often paired with techniques from all other tactics to achieve broader goals, like exploring a network or stealing data. For example, an adversary might use a remote access tool to run a PowerShell script that does Remot...

ATT&CK AI Context

Record summary

A quick snapshot of what this page covers.

Records1Records included in this view.
SourcePublicBuilt from public source data.
ModeStaticPrepared as a ready-to-read page.

ATT&CK object

The broader cybersecurity technique connected to these AI records.

The adversary is trying to run malicious code.

Execution consists of techniques that result in adversary-controlled code running on a local or remote system. Techniques that run malicious code are often paired with techniques from all other tactics to achieve broader goals, like exploring a network or stealing data. For example, an adversary might use a remote access tool to run a PowerShell script that does Remote System Discovery.

ATT&CK ID
TA0002
STIX ID
x-mitre-tactic--4ca45d45-df4d-4613-8980-bac22d278fa5
Name
Execution
Connected AI records
1

Connected AI records

AI security records connected to this cybersecurity technique.

AML.TA0005 - Execution

Confidence: 1.00
Kindatlas_tacticLink typesame_or_related_attack_tacticMethodexact_attack_external_id

Source

Where this page information comes from.