Process / Procedure / Policy Flashcards

0
Q

When a piece of malware is installed on a endpoint / victim what stage of the malware kill chain would this be?

A
  1. Installation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

What is Exploitation in the malware Kill chain

A

Exploiting a vulnerability to execute code on a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Delivery in the Kill chain?

A

Method in which the payload is delivered. USB, Email, Drive By Download…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is “Action on Objective” in the malware kill chain?

A

With hands on key board access intruders accomplish there original goals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is installation In the malware kill chain

A

Installing malware on the asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What stage in the kill chain is the following?

An attacker combines a exploit with a backdoor with the intention of using it on a targeted victim.

A
  1. Weaponization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Reconnaissance stage in the kill chain means to what?

A

Harvesting email addresses, Identifying targets, network scans, Information gathering that will help in the attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is stage 7 of the kill chain?

A

Action on Goal - Attacker here achieves his original goal. Examples include exfiltration of data. Increasing the motor speed on a cylinder “Stuxnet”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What stage in the kill chain is the following.

Network is being scanned?

A
  1. Reconnaissance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Exfiltration of data is considered as what step in the malware kill chain?

A
  1. Action on Goal
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What part of the Kill chain would a 0 day exploit be utilized

A
  1. Exploitation phase.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is stage 2 of the malware kill chain?

A

Weaponization - Combining a exploit with a backdoor for use on a target. “Building of Malware”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Multiple systems are reaching out to known malicious domains what is this a sign of? and what stage of the Malware Kill chain would this reflect?

A

Multiple systems are reaching out to a command and control server, the systems are likely all infected.

  1. Command and Control / c&c
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is c&c In the malware kill chain

A

Command channel for remote manipulation of victim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is Weaponization in the malware kill chain?

A

Coupling exploit with a backdoor into deliverable payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the 7 steps to the kill chain.

A
  1. Reconnaissance
  2. Weaponization
  3. Delivery
  4. Exploitation
  5. Installation
  6. Command and Control
  7. Action / Objectives
16
Q

What stage of the kill chain is the following.

Users are reporting multiple Phishing emails.

A
  1. Delivery