Cyber Range

MITRE ATT&CK: Impact Cyber Range

Impact consists of techniques that adversaries use to disrupt availability or compromise integrity by manipulating business and operational processes. Techniques used for impact can include destroying or tampering with data. In some cases, business processes can look fine, but may have been altered to benefit the adversaries’ goals. These techniques might be used by adversaries to follow through on their end goal or to provide cover for a confidentiality breach.

2 hours, 45 minutes

The Labs

Train hands-on

MITRE ATT&CK - Impact - Account Access Removal

Learn how to modify and remove account access on the system to disrupt system resource availability.

MITRE ATT&CK - Impact - Data Destruction

Learn how to destroy data and overwrite files in the system to make them irrecoverable.

MITRE ATT&CK - Impact - Data Manipulation

Learn how to inject the clipboard function in real-time, emphasizing data manipulation in transition and stored.

MITRE ATT&CK - Impact - Endpoint Denial of Service: Service Exhaustion Flood

Learn to perform a Denial of Service (DoS) attack by overwhelming the server through the systematic flooding of requests.

MITRE ATT&CK - Impact - Service Stop

This lab incorporates the MITRE ATT&CK Service Stop technique to show how adversaries can stop critical system processes to disrupt operations, undermine security, and expose vulnerabilities.

MITRE ATT&CK - Impact - Data Encrypted for Impact

This lab incorporates the MITRE ATT&CK Data Encrypted for Impact technique to show how encrypting critical information to cause disruption and hinder normal operations.

MITRE ATT&CK - Impact - Defacement

This lab incorporates the MITRE ATT&CK Defacement technique to show how to alter the appearance or content of a targeted system to portray a specific message or to achieve a malicious objective

MITRE ATT&CK - Impact - Endpoint Denial of Service: Application or System Exploitation

Learn to perform a Denial of Service (DoS) attack by crashing the application through crafted HTTP requests.

Plans & pricing

Infosec Skills Personal

$299 / year

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments