Attack Tools: Fields
Attack description
- Name, vulnerability(ies), systems, required tools, environment, network configuration(s), other
Effects
- Any effects beyond the exploit, detecting the use, blocking the use
Genealogy
- Who wrote it, where & when, cross-references to other attack tools, dates, documents