SECOPS 3: Incident Analysis in a Threat Centric SOC Flashcards

1
Q

Kill Chain steps

A
Recon
Weaponization
Delivery
Exploitation
Installation
C2
Actions on Objectives
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a kill chain?

A

Process of an attacker building a plan to effect a specific goal against a target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Weaponization

A

Development of a cyber weapon based on recon of a target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Delivery

A

Transmission of payload via communication vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Exploitation

A

Executing the malicious code.

Results in access to the target system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

3 Typical system weaknesses

A

Apps, OS, Users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Installation phase

A

Establish persistence/back door

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

C2 Phase

A

Exploited hosts beacon to the C2 server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Actions on objectives

A

Objective dependent actions taken by attacker.

The point of the whole thing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Recon mitigation

A

NGFW, NGIPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Weaponization mitigation

A

Threat Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Delivery Mitigation

A

DNS, Email, Web Security, NGIPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Exploit mitigation

A

Network Anti-Malware, NGFW, NGIPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Installation mitigation

A

Host Anti-Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

C2 Mitigation

A

DNS Security, Web Security, NGIPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Action on Obj. Mitigation

A

Flow analytics

17
Q

Diamond model nodes

A

Capability, Infrastructure, Adversary, Victim

18
Q

Diamond model Type 1 infrastructure

A

Owned by adversary

19
Q

Diamond model Type 2 infrastructure

A

Co-opted by adversary

20
Q

Diamond model meta-features (6)

A
Timestamp
Phase
Result
Direction
Methodology
Resources