MITRE Hunting — Initial Access: Drive-by Compromise

Meena
3 min readNov 10, 2022

Protect/Detect/Hunt series

Photo by FLY:D on Unsplash

Not every protection is detection based, it can also be prevention by configuring your network to standards. This blog series (MITRE Hunting) will focus on each MITRE technique and tactics, its detection/prevention process.

Initial Access consists of techniques that use various entry vectors to gain their initial foothold…

--

--

Meena

Cyber Security Professional | Amateur Astronomer | My nerdy space stuff and the “lot” from my blog LifeSpaceAndTheLot — https://linktr.ee/theallinone