MITRE ATT&CK Matrix Flashcards

1
Q

The _______ _____ is a framework for describing the actions an adversary may take while operating within an enterprise net.

A

ATT&CK Matrix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This describes how the attacker gets on the target system.

Examples: Spear phishing attachments, trusted relationships, valid accounts

A

Initial Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Execution of adversary controlled code on a system.

Examples: Command Line, PowerShell, Registry, Scheduled Task

A

Execution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Anything on a system that grants an adversary persistent presence.
Examples: Account Manipulation, DLL Search Order Hijacking, Shortcut Manipulation

A

Persistence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Action or technique which results in higher level of permissions of a system.
Examples: Hooking, Process Injection, Sudo Caching

A

Privilege Escalation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Actions an adversary might take to evade detection.

Examples: Binary Padding, Port Knocking, Timestomp

A

Defense Evasion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Obtaining legitimate credentials to a system.

Examples: Credential Dumping, Forced Authentication. Input Prompt

A

Credential Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Techniques that allow the adversary to gain knowledge about the system and internal network.
Examples: Network Service Scanning, Process Discovery, System Network Configuration Discovery

A

Discovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

______ ______ consists of techniques that enable an adversary to access and control remote systems on a network.
Examples: Pass the Hash, Shared Webroot, Taint Shared Content

A

Lateral Movement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Identifying and gathering files prior to exfiltration.

Examples: Automated Collection, Data from Network Share Drive, Man in the Browser

A

Collection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Removing files and information from a network.

Examples: Data Encrypted, Exfiltration over C2 channel, Scheduled Transfer

A

Exfiltration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Ways an adversary can communicate with a remote system they control.
Examples: Commonly Used Ports, Multiband Communication, Standard App Layer Protocol

A

Command and Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly