Module 02: Understanding Cyber Threats, IoCs, and Attack Methodology Flashcards
What is a cyber threat?
An act in which the adversary attempts to gain unauthorized access to an organization’s network by exploiting communication paths.
What three things are behind a threat?
Intent
Capability
Motive
What is TTP?
Part of the capability behind a threat. Tactics, Techniques, and Procedures used to target an organization.
What allows the opportunity of a threat?
Security vulnerabilities or weaknesses
What are the typical attack vectors?
Cloud computing threats Viruses and worms Ransomware Mobile threats Botnet Insider threat Phishing Web application threats IoT threats
What is the formula of an attack?
Attack=Motive(goal) + Method (TTPs) + Vulnerability
What does motive originate from?
A motive originates out of the notion that the target system stores or processes something valuable, and this leads to a threat of an attack on the system
What are tactics?
Strategy followed by an attacker to perform the attack from beginning to end i.e. information gathering for initial exploitation, privilege escalation, lateral movement, etc.
What are techniques?
Technical methods used by an attacker to achieve intermediate results during the attack i.e. initial exploitation, setting up and maintaining C&C channels, etc.
What are procedures?
Organizational approach followed by the threat actors to launch an attack
What is a vulnerability?
The existence of a weakness, design, or implementation error that, when exploited, leads to an unexpected and undesired event compromising the security of the system.
What is a reconnaissance attack?
Attackers attempt to discover target network’s information to gain as much knowledge as possible around open ports, services, IPs, network layout etc.
What are common reconnaissance methods?
Social engineer
Port scanning
DNS footprinting
Ping sweeping
What are two types of reconnaissance attacks?
Active and Passive
What are five types of network level attacks?
Packet sniffing Port scanning Ping sweeping DNS footprinting Social engineering
What type of attack is used to check for live hosts, services, ports, etc.
Network scanning
What is a popular network scanning tool?
nmap
What process checks what services are running on a target computer by sending a sequence of messages?
Port scanning
What are the various network level attacks?
Reconnaissance
Network scanning
Port Scanning
DNS Footprinting
What attack allows the attacker to determine key hosts in the network and perform social engineering attacks?
DNS footprinting
This process monitors and captures all data packets passing through a given network using sniffing tools
Network sniffing
What often allows an attacker to perform network sniffing on a network?
Unsecured switch ports