SECOPS 4: Hunting Cyber Threats Flashcards

1
Q

HM0

A

Relies on alerting (IDS). Cannot effectively hunt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

HM1

A

Manual hunt ops. IDS alerts and internal info. Use threat intel feeds to identify threats.

Manual hunt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

HM2

A

Incorporate hunt techniques from external. Large amounts of info.

Active hunt operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

HMM

A

Hunting Maturity Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hunting Maturity Model

A

Created by Sqrrl. Levels of maturity for a threat hunting operation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

HM3

A

Analyze info of different types and use it to ID new malicious activity.
Do not rely on external.
Machine learning, data vizualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

HM4.

A

HM3 + automation. Scripts written based on intel and procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Hunting Cycle

A

Hypothesize
Investigate
Uncover
Inform and enrich

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hypothesize

A

Look at system from perspective of the atacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Investigate (Hunting cycle)

A

Use tools to investigate hypothesis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Uncover (Hunting cycle)

A

Hunter attempts to discover a pattern or TTP.

Analyst investigates IOC’s to determine who was infected and what was done.

TTP’s are then shared.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Inform and enrich (Hunting cycle)

A

Documentation and automation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

TTP

A

Tactics, techniques, and procedures.

How an attacker maintains presence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CVSS calculates…

A

chance of compromise and potential severity of damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Base metric

A

characteristics of a vuln that are constant over time and across user environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Base metric composed of…

A

Exploitability metrics, impact metrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

CVSS Attack Vector

A

More remote equals higher score.

Local, adjacent, network, physical

18
Q

Attack complexity

A

Conditions beyond attackers control that must exist to exploit

Low, High

19
Q

Privileges required

A

Privileges needed to exploit

None, low, high

20
Q

User interaction

A

Whether a user other than the attacker must participate for exploitation to succeed.

21
Q

Scope

A

Ability for vuln in one component to impact other resources or privileges.

22
Q

Confidentiality Impact

A

Vulnerabilities impact on confidentiality

23
Q

Integrity impact

A

Impact to trustworthiness or accuracy of info

24
Q

Availability impact

A

Can affect bandwidth, proc time, disk space

25
Exploit code maturity
Likelihood of vuln being attacked based on current exploit availability
26
Remediation level
Score goes down with availability of a patch
27
Report confidence
Confidence that the vuln exists.
28
CVSS Environmental Metrics
Customize score based on Importance of IT asset to the users organization
29
Modified base impacts
Modify the impact of individual base metrics (Attack vector, Scope, CIA, etc.)
30
CVSS Scores are computed from
"Big 3" CIA
31
What modifies CVSS scores?
Temporal and environmental scoring
32
What has largest bearing on CVSS score?
Base score
33
Temporal scoring
"Time". Based on vuln.
34
CVSS scoring interval
Point in time. Scheduled re-evaluation.
35
CVSS Final score
Score including environmental score. Used to prioritize
36
Base score
Computed by the vendor or originator with intention of being publishied
37
CVSS Rating: None
0.0
38
CVSS Rating: Low
0.1-3
39
CVSS Rating: Medium
4-6
40
CVSS Rating: High
7-8
41
CVSS Rating: Critical
9-10