Overview
NOTE: For this exercise, you can use any VM or host computer with a web browser and internet access. Since it uses a public website, its contents might have changed since the time of publication.
In this exercise, you will examine the structure of the MITRE ATT&CK framework on MITRE’s website, including specific techniques and threat actors.