8 - OCO Flashcards
1
Q
Lockheed Martin’s Cyber Kill Chain
A
- Framework aimed to improve visibility and understanding of attacker’s TTPs
- Reconnaissance
- Weaponization
- Delivery
- Exploitation
- Installation
- Command and Control
- Actions and Objectives
2
Q
Reconnaissance (Lockheed)
A
- Harvesting email addresses, conference information, etc
3
Q
Weaponization (Lockheed)
A
- Coupling exploit with backdoor into deliverable payload
4
Q
Delivery (Lockheed)
A
- Delivering weaponized bundle to a victim via email, web, etc
5
Q
Exploitation (Lockheed)
A
- Exploiting a vulnerability to execute code on victim’s system
6
Q
Installation (Lockheed)
A
- Installing malware on the asset
7
Q
Command and Control
A
- Command channel for remote manipulation of victim
8
Q
Actions on Objectives
A
- Intruders accomplish original goals
9
Q
MITRE ATT&CK for Enterprise
A
- Adversarial Tactics, Techniques, and Common Knowledge
– Describes actions an adversary would take against a target network - Last 4 stages of Lockheed Cyber Kill Chain broken down into:
– Initial Access
– Execution
– Persistence
– Privilege Escalation
– Defensive Evasion
– Credential Access
– Discovery
– Lateral Movement
– Collection
– Exfiltration
– Command and Control
10
Q
Hacker Methodology
A
- Footprinting
- Scanning
- Enumeration
- Gaining Access
- Escalating Privileges
- Pilfering Data
- Covering Tracks
- Creating Backdoors
- Actions on Objectives
11
Q
Footprinting (Hacker Methodology)
A
- Collecting data about your target
- Passive - no direct interaction
- Methods
– whois
– nslookup / dig
– Google
– Social Networking
12
Q
Scanning (Hacker Methodology)
A
- Bulk assessment and identification
- Active - direct interaction
- Methods
– Ping sweeps
– Trace route
– nmap (-sn also does ping sweep)
13
Q
Enumeration (Hacker Methodology)
A
- Looking for vulnerabilities
- Aggressive probing
- Methods
– Service version detection (-sV in nmap)
– OS detection (-O in nmap)
– Banner grabbing
14
Q
Gaining Access (Hacker Methodology)
A
- Establish a foothold on target system
- Methods
– default Username/passwords
– Brute force PW guessing
– Remote code execution (metasploit, phishing)
– Buffer overflow
15
Q
Escalating Privileges (Hacker Methodology)
A
- Take full control of system
- Elevate to higher system privileges
- Methods
– Hashdump
– PW Cracking
– Phishing (if from user-level)
16
Q
Pilfering Data (Hacker Methodology)
A
- Gather information from target system
- Copy, don’t move
- System configs
- Shares
- ARP tables
- Be careful of large data transfers
17
Q
Covering Tracks (Hacker Methodology)
A
- Make sure users/admins don’t know we are here
- Methods
– Log removal
– Restarting crashed services
– Timestomping
– Removing uploaded/installed malware
18
Q
Creating Backdoors (Hacker Methodology)
A
- Persist on the system
- Methods
– Rogue user accounts
– Meterpreter
– Netcat
– Cron Job/Scheduled Tasks
19
Q
Actions on Objectives (Hacker Methodology)
A
- Perform end-goal actions on target systems
- Denial of Service
– Encryption
– Password Changes
– Deleting critical system files - Installing Malware
– Spyware Ransomware - Stealing Information
– PII
– Financial
20
Q
Advanced Methods (Hacker Methodology)
A
- Post Exploitation Survey
- Tunneling
- Buffer overflows
- Rootkits
- Man in the Middle
- Triggering
- Obfuscation
- Social Engineering
21
Q
Post Exploitation Survey (Hacker Methodology)
A
- Target verification
- Information Gathering
- Look for:
– Host verification (IP, hostname, etc.)
– Host configuration (interfaces, firewall rules, installed programs, etc.)
– Situational Awareness (process list, network connections, antivirus, etc.)
– Useful Information (desktop, docs, dirwalk)