Attack Frameworks Flashcards

1
Q

Kill Chain

A

A model Developed by Lockheed Martin that describes the stages by which a threat actor progresses a network intrusion. This is a 7 step process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Reconnaissance

A

The attacker determines what methods to use to complete the phases of the attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Weaponization

A

The attacker couples payload code that will enable access with exploit code that will use a vulnerability to execute on the target system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Delivery

A

The attacker identifies a vector by which to transmit the weaponized code to the target environment. This could be by email etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Exploitation

A

The weaponized code is executed on the target system by this mechanism. This could be someone opening up a link that could be a phishing link.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Installation

A

This mechanism enables the weaponized code to run a remote access tools and achieve persistence on the target system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Command & Control (C2)

A

The weaponized code establishes an outbound channel to a remote server that can be used to control the remote access tool and possibly download additional tools to progress the attack. The person pretty much owns the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Actions on Objectives

A

The attacker typically uses the access he has achieved to covertly collect info from target systems and transfer it to a remote system or achieve other goals and motives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Kill Chain Analysis

A

This can be used to identify a defensive course-of-action matrix to counter the progress of an attack at each stage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

MITRE Attack Framework

A

A knowledge base maintained by the MITRE Corporation for listing and explaining specific adversary tactics, techniques, and common knowledge or procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Diamond Model of Intrusion Analysis

A

A framework for analyzing cybersecurity incidents and intrusions by exploring the relationships between four core features: adversary, capability, infrastructure and victim.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly