Cybersäkerhet Flashcards
What are the seven phases in the cyber kill chain?
- Reconnaissance
- Weaponization
- Delivery
- Exploitation
- Installation
- Command and Control
- Action on Objective
Reconnaissance
Identify and select a target. Often includes both OSINT and network
scanning.
Weaponization
Preparation of the attack payload. Create or get a tool for the attack.
Delivery
Find a way to deliver the payload to the target. This can be done through phishing and drive-by download.
Exploitation
Trigger the payload
Installation
Installation of a backdoor or Remote access trojan to maintain access
Command and Control
Establish infrastructure to enable C2 access to the compromised host
Actions on objectives
You have access to your target device and can now fulfill your goal. Ransom and data exfiltration.
Information gathering
Gather information from open sources (OSINT).
Enumeration
Scan the target to get more information about its technical properties:
* Look for open ports.
* Trying to figure out what software targets are running.
Exploitation
About finding and using vulnerabilities. You try to access the systems, which often involves using or building exploits.
Privilege Escalation
Expanding your access to the system.
- Horizontal: You gain access to another account with similar permissions.
- Vertical: You gain access to accounts with other different permissions.
Post-exploitation
When an attacker would realize their attack objective.
Black-box pentest
When the pentester have no knowledge about the attack target.
- Most similar to a real attack
- Able to capture ” reconnaissance” aspects of an attack
- Often time-consuming, and expensive
- Since the pentester is unaware of how the target works, attack
surfaces may be missed
Grey-box pentest
Pentester has some knowledge about the attack target.
- Can speed up the test and therefore limit costs
- Can target certain aspects of the test target
White-box pentest
Pentester has access to full knowledge about the target’s inner workings.
- Typically used for detailed testing of the functionality of the target
and expected behavior - Allows for the entire attack surface to be evaluated
Disclosure ethics
To maximize both interest, it is typical to work under a responsible
disclosure policy comprising the following steps
- Discovery of a vulnerability
- Report the vulnerability to the concerned vendor or organization
- Verification of the vulnerability by the recipient
- Remediation of the vulnerability by the vendor
- Disclosure of the vulnerability once the fix is ready
What is Shodan?
Online tool for searching for devices connected to the internet