<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url><loc>https://blog.pentestnepal.tech/attack/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1001-001-junk-data/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1001-002-steganography/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1001-003-protocol-or-service-impersonation/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1001-data-obfuscation/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1003-001-lsass-memory/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1003-002-security-account-manager/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1003-003-ntds/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1003-004-lsa-secrets/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1003-005-cached-domain-credentials/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1003-006-dcsync/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1003-007-proc-filesystem/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1003-008-etc-passwd-and-etc-shadow/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1003-os-credential-dumping/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1005-data-from-local-system/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1006-direct-volume-access/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1007-system-service-discovery/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1008-fallback-channels/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1010-application-window-discovery/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1011-001-exfiltration-over-bluetooth/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1011-exfiltration-over-other-network-medium/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1012-query-registry/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1014-rootkit/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1016-001-internet-connection-discovery/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1016-002-wi-fi-discovery/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1016-system-network-configuration-discovery/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1018-remote-system-discovery/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1020-001-traffic-duplication/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1020-automated-exfiltration/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1021-001-remote-desktop-protocol/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1021-002-smb-windows-admin-shares/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1021-003-distributed-component-object-model/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1021-004-ssh/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1021-005-vnc/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1021-006-windows-remote-management/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1021-007-cloud-services/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1021-008-direct-cloud-vm-connections/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1021-remote-services/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1025-data-from-removable-media/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1027-001-binary-padding/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1027-002-software-packing/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1027-003-steganography/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1027-004-compile-after-delivery/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1027-005-indicator-removal-from-tools/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1027-006-html-smuggling/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1027-007-dynamic-api-resolution/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1027-008-stripped-payloads/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1027-009-embedded-payloads/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1027-010-command-obfuscation/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1027-011-fileless-storage/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1027-012-lnk-icon-smuggling/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1027-013-encrypted-encoded-file/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1027-014-polymorphic-code/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1027-015-compression/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1027-016-junk-code-insertion/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1027-017-svg-smuggling/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1027-018-invisible-unicode/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1027-obfuscated-files-or-information/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1029-scheduled-transfer/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1030-data-transfer-size-limits/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1033-system-owner-user-discovery/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1036-001-invalid-code-signature/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1036-002-right-to-left-override/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1036-003-rename-legitimate-utilities/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1036-004-masquerade-task-or-service/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1036-005-match-legitimate-resource-name-or-location/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1036-006-space-after-filename/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1036-007-double-file-extension/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1036-008-masquerade-file-type/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1036-009-break-process-trees/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1036-010-masquerade-account-name/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1036-011-overwrite-process-arguments/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1036-012-browser-fingerprint/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1036-masquerading/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1037-001-logon-script-windows/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1037-002-login-hook/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1037-003-network-logon-script/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1037-004-rc-scripts/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1037-005-startup-items/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1037-boot-or-logon-initialization-scripts/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1039-data-from-network-shared-drive/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1040-network-sniffing/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1041-exfiltration-over-c2-channel/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1046-network-service-discovery/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1047-windows-management-instrumentation/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1048-001-exfiltration-over-symmetric-encrypted-non-c2-protocol/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1048-002-exfiltration-over-asymmetric-encrypted-non-c2-protocol/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1048-003-exfiltration-over-unencrypted-non-c2-protocol/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1048-exfiltration-over-alternative-protocol/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1049-system-network-connections-discovery/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1052-001-exfiltration-over-usb/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1052-exfiltration-over-physical-medium/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1053-002-at/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1053-003-cron/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1053-005-scheduled-task/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1053-006-systemd-timers/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1053-007-container-orchestration-job/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1053-scheduled-task-job/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1055-001-dynamic-link-library-injection/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1055-002-portable-executable-injection/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1055-003-thread-execution-hijacking/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1055-004-asynchronous-procedure-call/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1055-005-thread-local-storage/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1055-008-ptrace-system-calls/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1055-009-proc-memory/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1055-011-extra-window-memory-injection/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1055-012-process-hollowing/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1055-013-process-doppelg-nging/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1055-014-vdso-hijacking/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1055-015-listplanting/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1055-process-injection/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1056-001-keylogging/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1056-002-gui-input-capture/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1056-003-web-portal-capture/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1056-004-credential-api-hooking/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1056-input-capture/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1057-process-discovery/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1059-001-powershell/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1059-002-applescript/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1059-003-windows-command-shell/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1059-004-unix-shell/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1059-005-visual-basic/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1059-006-python/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1059-007-javascript/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1059-008-network-device-cli/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1059-009-cloud-api/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1059-010-autohotkey-autoit/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1059-011-lua/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1059-012-hypervisor-cli/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1059-013-container-cli-api/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1059-command-and-scripting-interpreter/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1068-exploitation-for-privilege-escalation/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1069-001-local-groups/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1069-002-domain-groups/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1069-003-cloud-groups/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1069-permission-groups-discovery/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1070-003-clear-command-history/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1070-004-file-deletion/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1070-005-network-share-connection-removal/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1070-006-timestomp/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1070-007-clear-network-connection-history-and-configurations/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1070-008-clear-mailbox-data/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1070-009-clear-persistence/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1070-010-relocate-malware/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1070-indicator-removal/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1071-001-web-protocols/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1071-002-file-transfer-protocols/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1071-003-mail-protocols/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1071-004-dns/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1071-005-publish-subscribe-protocols/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1071-application-layer-protocol/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1072-software-deployment-tools/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1074-001-local-data-staging/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1074-002-remote-data-staging/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1074-data-staged/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1078-001-default-accounts/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1078-002-domain-accounts/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1078-003-local-accounts/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1078-004-cloud-accounts/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1078-valid-accounts/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1080-taint-shared-content/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1082-system-information-discovery/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1083-file-and-directory-discovery/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1087-001-local-account/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1087-002-domain-account/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1087-003-email-account/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1087-004-cloud-account/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1087-account-discovery/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1090-001-internal-proxy/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1090-002-external-proxy/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1090-003-multi-hop-proxy/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1090-004-domain-fronting/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1090-proxy/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1091-replication-through-removable-media/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1092-communication-through-removable-media/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1095-non-application-layer-protocol/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1098-001-additional-cloud-credentials/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1098-002-additional-email-delegate-permissions/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1098-003-additional-cloud-roles/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1098-004-ssh-authorized-keys/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1098-005-device-registration/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1098-006-additional-container-cluster-roles/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1098-007-additional-local-or-domain-groups/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1098-account-manipulation/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1102-001-dead-drop-resolver/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1102-002-bidirectional-communication/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1102-003-one-way-communication/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1102-web-service/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1104-multi-stage-channels/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1105-ingress-tool-transfer/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1106-native-api/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1110-001-password-guessing/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1110-002-password-cracking/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1110-003-password-spraying/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1110-004-credential-stuffing/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1110-brute-force/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1111-multi-factor-authentication-interception/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1112-modify-registry/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1113-screen-capture/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1114-001-local-email-collection/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1114-002-remote-email-collection/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1114-003-email-forwarding-rule/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1114-email-collection/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1115-clipboard-data/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1119-automated-collection/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1120-peripheral-device-discovery/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1123-audio-capture/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1124-system-time-discovery/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1125-video-capture/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1127-001-msbuild/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1127-002-clickonce/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1127-003-jamplus/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1127-trusted-developer-utilities-proxy-execution/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1129-shared-modules/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1132-001-standard-encoding/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1132-002-non-standard-encoding/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1132-data-encoding/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1133-external-remote-services/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1134-001-token-impersonation-theft/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1134-002-create-process-with-token/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1134-003-make-and-impersonate-token/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1134-004-parent-pid-spoofing/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1134-005-sid-history-injection/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1134-access-token-manipulation/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1135-network-share-discovery/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1136-001-local-account/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1136-002-domain-account/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1136-003-cloud-account/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1136-create-account/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1137-001-office-template-macros/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1137-002-office-test/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1137-003-outlook-forms/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1137-004-outlook-home-page/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1137-005-outlook-rules/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1137-006-add-ins/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1137-office-application-startup/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1140-deobfuscate-decode-files-or-information/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1176-001-browser-extensions/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1176-002-ide-extensions/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1176-software-extensions/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1185-browser-session-hijacking/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1187-forced-authentication/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1189-drive-by-compromise/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1190-exploit-public-facing-application/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1195-001-compromise-software-dependencies-and-development-tools/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1195-002-compromise-software-supply-chain/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1195-003-compromise-hardware-supply-chain/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1195-supply-chain-compromise/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1197-bits-jobs/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1199-trusted-relationship/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1200-hardware-additions/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1201-password-policy-discovery/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1202-indirect-command-execution/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1203-exploitation-for-client-execution/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1204-001-malicious-link/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1204-002-malicious-file/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1204-003-malicious-image/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1204-004-malicious-copy-and-paste/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1204-005-malicious-library/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1204-user-execution/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1205-001-port-knocking/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1205-002-socket-filters/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1205-traffic-signaling/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1207-rogue-domain-controller/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1210-exploitation-of-remote-services/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1211-exploitation-for-stealth/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1212-exploitation-for-credential-access/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1213-001-confluence/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1213-002-sharepoint/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1213-003-code-repositories/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1213-004-customer-relationship-management-software/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1213-005-messaging-applications/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1213-006-databases/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1213-data-from-information-repositories/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1216-001-pubprn/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1216-002-syncappvpublishingserver/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1216-system-script-proxy-execution/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1217-browser-information-discovery/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1218-001-compiled-html-file/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1218-002-control-panel/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1218-003-cmstp/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1218-004-installutil/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1218-005-mshta/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1218-007-msiexec/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1218-008-odbcconf/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1218-009-regsvcs-regasm/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1218-010-regsvr32/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1218-011-rundll32/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1218-012-verclsid/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1218-013-mavinject/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1218-014-mmc/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1218-015-electron-applications/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1218-system-binary-proxy-execution/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1219-001-ide-tunneling/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1219-002-remote-desktop-software/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1219-003-remote-access-hardware/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1219-remote-access-tools/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1220-xsl-script-processing/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1221-template-injection/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1222-001-windows-permissions/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1222-002-linux-and-mac-permissions/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1222-file-and-directory-permissions-modification/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1480-001-environmental-keying/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1480-002-mutual-exclusion/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1480-execution-guardrails/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1482-domain-trust-discovery/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1484-001-group-policy-modification/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1484-002-trust-modification/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1484-domain-or-tenant-policy-modification/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1485-001-lifecycle-triggered-deletion/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1485-data-destruction/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1486-data-encrypted-for-impact/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1489-service-stop/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1490-inhibit-system-recovery/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1491-001-internal-defacement/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1491-002-external-defacement/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1491-defacement/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1495-firmware-corruption/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1496-001-compute-hijacking/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1496-002-bandwidth-hijacking/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1496-003-sms-pumping/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1496-004-cloud-service-hijacking/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1496-resource-hijacking/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1497-001-system-checks/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1497-002-user-activity-based-checks/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1497-003-time-based-checks/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1497-virtualization-sandbox-evasion/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1498-001-direct-network-flood/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1498-002-reflection-amplification/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1498-network-denial-of-service/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1499-001-os-exhaustion-flood/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1499-002-service-exhaustion-flood/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1499-003-application-exhaustion-flood/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1499-004-application-or-system-exploitation/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1499-endpoint-denial-of-service/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1505-001-sql-stored-procedures/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1505-002-transport-agent/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1505-003-web-shell/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1505-004-iis-components/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1505-005-terminal-services-dll/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1505-006-vsphere-installation-bundles/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1505-server-software-component/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1518-001-security-software-discovery/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1518-002-backup-software-discovery/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1518-software-discovery/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1525-implant-internal-image/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1526-cloud-service-discovery/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1528-steal-application-access-token/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1529-system-shutdown-reboot/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1530-data-from-cloud-storage/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1531-account-access-removal/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1534-internal-spearphishing/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1535-unused-unsupported-cloud-regions/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1537-transfer-data-to-cloud-account/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1538-cloud-service-dashboard/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1539-steal-web-session-cookie/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1542-001-system-firmware/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1542-002-component-firmware/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1542-003-bootkit/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1542-004-rommonkit/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1542-005-tftp-boot/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1542-pre-os-boot/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1543-001-launch-agent/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1543-002-systemd-service/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1543-003-windows-service/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1543-004-launch-daemon/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1543-005-container-service/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1543-create-or-modify-system-process/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1546-001-change-default-file-association/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1546-002-screensaver/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1546-003-windows-management-instrumentation-event-subscription/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1546-004-unix-shell-configuration-modification/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1546-005-trap/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1546-006-lc-load-dylib-addition/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1546-007-netsh-helper-dll/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1546-008-accessibility-features/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1546-009-appcert-dlls/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1546-010-appinit-dlls/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1546-011-application-shimming/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1546-012-image-file-execution-options-injection/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1546-013-powershell-profile/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1546-014-emond/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1546-015-component-object-model-hijacking/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1546-016-installer-packages/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1546-017-udev-rules/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1546-018-python-startup-hooks/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1546-event-triggered-execution/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1547-001-registry-run-keys-startup-folder/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1547-002-authentication-package/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1547-003-time-providers/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1547-004-winlogon-helper-dll/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1547-005-security-support-provider/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1547-006-kernel-modules-and-extensions/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1547-007-re-opened-applications/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1547-008-lsass-driver/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1547-009-shortcut-modification/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1547-010-port-monitors/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1547-012-print-processors/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1547-013-xdg-autostart-entries/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1547-014-active-setup/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1547-015-login-items/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1547-boot-or-logon-autostart-execution/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1548-001-setuid-and-setgid/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1548-002-bypass-user-account-control/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1548-003-sudo-and-sudo-caching/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1548-004-elevated-execution-with-prompt/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1548-005-temporary-elevated-cloud-access/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1548-006-tcc-manipulation/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1548-abuse-elevation-control-mechanism/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1550-001-application-access-token/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1550-002-pass-the-hash/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1550-003-pass-the-ticket/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1550-004-web-session-cookie/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1550-use-alternate-authentication-material/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1552-001-credentials-in-files/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1552-002-credentials-in-registry/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1552-003-shell-history/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1552-004-private-keys/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1552-005-cloud-instance-metadata-api/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1552-006-group-policy-preferences/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1552-007-container-api/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1552-008-chat-messages/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1552-unsecured-credentials/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1553-001-gatekeeper-bypass/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1553-002-code-signing/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1553-003-sip-and-trust-provider-hijacking/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1553-004-install-root-certificate/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1553-005-mark-of-the-web-bypass/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1553-006-code-signing-policy-modification/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1553-subvert-trust-controls/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1554-compromise-host-software-binary/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1555-001-keychain/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1555-002-securityd-memory/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1555-003-credentials-from-web-browsers/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1555-004-windows-credential-manager/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1555-005-password-managers/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1555-006-cloud-secrets-management-stores/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1555-credentials-from-password-stores/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1556-001-domain-controller-authentication/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1556-002-password-filter-dll/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1556-003-pluggable-authentication-modules/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1556-004-network-device-authentication/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1556-005-reversible-encryption/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1556-006-multi-factor-authentication/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1556-007-hybrid-identity/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1556-008-network-provider-dll/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1556-009-conditional-access-policies/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1556-modify-authentication-process/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1557-001-name-resolution-poisoning-and-smb-relay/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1557-002-arp-cache-poisoning/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1557-003-dhcp-spoofing/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1557-004-evil-twin/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1557-adversary-in-the-middle/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1558-001-golden-ticket/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1558-002-silver-ticket/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1558-003-kerberoasting/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1558-004-as-rep-roasting/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1558-005-ccache-files/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1558-steal-or-forge-kerberos-tickets/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1559-001-component-object-model/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1559-002-dynamic-data-exchange/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1559-003-xpc-services/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1559-inter-process-communication/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1560-001-archive-via-utility/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1560-002-archive-via-library/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1560-003-archive-via-custom-method/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1560-archive-collected-data/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1561-001-disk-content-wipe/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1561-002-disk-structure-wipe/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1561-disk-wipe/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1563-001-ssh-hijacking/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1563-002-rdp-hijacking/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1563-remote-service-session-hijacking/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1564-001-hidden-files-and-directories/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1564-002-hidden-users/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1564-003-hidden-window/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1564-004-ntfs-file-attributes/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1564-005-hidden-file-system/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1564-006-run-virtual-instance/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1564-007-vba-stomping/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1564-008-email-hiding-rules/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1564-009-resource-forking/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1564-010-process-argument-spoofing/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1564-011-ignore-process-interrupts/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1564-012-file-path-exclusions/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1564-013-bind-mounts/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1564-014-extended-attributes/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1564-hide-artifacts/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1565-001-stored-data-manipulation/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1565-002-transmitted-data-manipulation/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1565-003-runtime-data-manipulation/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1565-data-manipulation/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1566-001-spearphishing-attachment/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1566-002-spearphishing-link/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1566-003-spearphishing-via-service/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1566-004-spearphishing-voice/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1566-phishing/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1567-001-exfiltration-to-code-repository/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1567-002-exfiltration-to-cloud-storage/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1567-003-exfiltration-to-text-storage-sites/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1567-004-exfiltration-over-webhook/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1567-exfiltration-over-web-service/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1568-001-fast-flux-dns/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1568-002-domain-generation-algorithms/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1568-003-dns-calculation/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1568-dynamic-resolution/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1569-001-launchctl/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1569-002-service-execution/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1569-003-systemctl/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1569-system-services/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1570-lateral-tool-transfer/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1571-non-standard-port/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1572-protocol-tunneling/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1573-001-symmetric-cryptography/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1573-002-asymmetric-cryptography/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1573-encrypted-channel/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1574-001-dll/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1574-004-dylib-hijacking/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1574-005-executable-installer-file-permissions-weakness/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1574-006-dynamic-linker-hijacking/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1574-007-path-interception-by-path-environment-variable/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1574-008-path-interception-by-search-order-hijacking/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1574-009-path-interception-by-unquoted-path/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1574-010-services-file-permissions-weakness/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1574-011-services-registry-permissions-weakness/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1574-012-cor-profiler/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1574-013-kernelcallbacktable/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1574-014-appdomainmanager/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1574-hijack-execution-flow/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1578-001-create-snapshot/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1578-002-create-cloud-instance/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1578-003-delete-cloud-instance/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1578-004-revert-cloud-instance/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1578-005-modify-cloud-compute-configurations/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1578-modify-cloud-compute-infrastructure/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1580-cloud-infrastructure-discovery/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1583-001-domains/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1583-002-dns-server/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1583-003-virtual-private-server/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1583-004-server/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1583-005-botnet/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1583-006-web-services/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1583-007-serverless/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1583-008-malvertising/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1583-acquire-infrastructure/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1584-001-domains/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1584-002-dns-server/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1584-003-virtual-private-server/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1584-004-server/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1584-005-botnet/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1584-006-web-services/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1584-007-serverless/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1584-008-network-devices/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1584-compromise-infrastructure/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1585-001-social-media-accounts/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1585-002-email-accounts/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1585-003-cloud-accounts/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1585-establish-accounts/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1586-001-social-media-accounts/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1586-002-email-accounts/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1586-003-cloud-accounts/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1586-compromise-accounts/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1587-001-malware/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1587-002-code-signing-certificates/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1587-003-digital-certificates/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1587-004-exploits/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1587-develop-capabilities/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1588-001-malware/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1588-002-tool/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1588-003-code-signing-certificates/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1588-004-digital-certificates/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1588-005-exploits/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1588-006-vulnerabilities/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1588-007-artificial-intelligence/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1588-obtain-capabilities/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1589-001-credentials/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1589-002-email-addresses/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1589-003-employee-names/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1589-gather-victim-identity-information/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1590-001-domain-properties/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1590-002-dns/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1590-003-network-trust-dependencies/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1590-004-network-topology/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1590-005-ip-addresses/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1590-006-network-security-appliances/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1590-gather-victim-network-information/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1591-001-determine-physical-locations/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1591-002-business-relationships/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1591-003-identify-business-tempo/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1591-004-identify-roles/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1591-gather-victim-org-information/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1592-001-hardware/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1592-002-software/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1592-003-firmware/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1592-004-client-configurations/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1592-gather-victim-host-information/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1593-001-social-media/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1593-002-search-engines/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1593-003-code-repositories/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1593-search-open-websites-domains/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1594-search-victim-owned-websites/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1595-001-scanning-ip-blocks/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1595-002-vulnerability-scanning/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1595-003-wordlist-scanning/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1595-active-scanning/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1596-001-dns-passive-dns/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1596-002-whois/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1596-003-digital-certificates/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1596-004-cdns/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1596-005-scan-databases/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1596-search-open-technical-databases/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1597-001-threat-intel-vendors/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1597-002-purchase-technical-data/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1597-search-closed-sources/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1598-001-spearphishing-service/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1598-002-spearphishing-attachment/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1598-003-spearphishing-link/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1598-004-spearphishing-voice/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1598-phishing-for-information/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1599-001-network-address-translation-traversal/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1599-network-boundary-bridging/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1600-001-reduce-key-space/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1600-002-disable-crypto-hardware/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1600-weaken-encryption/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1601-001-patch-system-image/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1601-002-downgrade-system-image/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1601-modify-system-image/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1602-001-snmp-mib-dump/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1602-002-network-device-configuration-dump/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1602-data-from-configuration-repository/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1606-001-web-cookies/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1606-002-saml-tokens/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1606-forge-web-credentials/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1608-001-upload-malware/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1608-002-upload-tool/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1608-003-install-digital-certificate/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1608-004-drive-by-target/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1608-005-link-target/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1608-006-seo-poisoning/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1608-stage-capabilities/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1609-container-administration-command/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1610-deploy-container/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1611-escape-to-host/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1612-build-image-on-host/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1613-container-and-resource-discovery/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1614-001-system-language-discovery/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1614-system-location-discovery/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1615-group-policy-discovery/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1619-cloud-storage-object-discovery/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1620-reflective-code-loading/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1621-multi-factor-authentication-request-generation/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1622-debugger-evasion/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1647-plist-file-modification/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1648-serverless-execution/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1649-steal-or-forge-authentication-certificates/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1650-acquire-access/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1651-cloud-administration-command/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1652-device-driver-discovery/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1653-power-settings/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1654-log-enumeration/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1657-financial-theft/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1659-content-injection/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1665-hide-infrastructure/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1666-modify-cloud-resource-hierarchy/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1667-email-bombing/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1668-exclusive-control/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1669-wi-fi-networks/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1671-cloud-application-integration/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1673-virtual-machine-discovery/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1674-input-injection/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1675-esxi-administration-command/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1677-poisoned-pipeline-execution/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1678-delay-execution/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1679-selective-exclusion/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1680-local-storage-discovery/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1681-search-threat-vendor-data/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1682-query-public-ai-services/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1683-001-written-content/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1683-002-audio-visual-content/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1683-generate-content/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1684-001-impersonation/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1684-002-email-spoofing/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1684-social-engineering/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1685-001-disable-or-modify-windows-event-log/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1685-002-disable-or-modify-cloud-log/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1685-003-modify-or-spoof-tool-ui/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1685-004-disable-or-modify-linux-audit-system-log/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1685-005-clear-windows-event-logs/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1685-006-clear-linux-or-mac-system-logs/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1685-disable-or-modify-tools/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1686-001-cloud-firewall/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1686-002-network-device-firewall/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1686-003-windows-host-firewall/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1686-disable-or-modify-system-firewall/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1687-exploitation-for-defense-impairment/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1688-safe-mode-boot/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1689-downgrade-attack/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/attack/t1690-prevent-command-history-logging/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
</urlset>