Section 1.2: Threat Intelligence Flashcards

1
Q

What is TTP?

A

Techniques, tactics, and procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the Attack cycle like?

A

External recon -> Compromised machine -> Internal Recon -> Local Privilege Escalation -> Compromise Creds -> Admin Recon -> Remote Code Execution -> Domain Admin Creds -> Domain Dominance -> Remote Code Execution -> Asset Recon -> Local Privilege Escalation -> Asset Access -> Exfiltration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What steps are inside the Cyber Kill Chain?

A

Recon, Weaponization, Delivery, Exploitation, Installation, Command & Control, and Actions on Objective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How do responders develop profiles on their adversaries?

A

They record, track and group information on the attack to create a profile. All adversaries have preferences on how to commit intrusions and what tools they use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name the types of indicators responder’s document.

A

Atomic Indicators, Computed Indicators, and Behavioral Indicators.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are Atomic Indicators?

A

pieces of data that are indicators of adversary activity on their own (IP addresses, email, static string C2 channels, and domain names).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are Computed Indicators?

A

Pretty much computed. The most common are hashes of malicious files or specific data that is decoded in custom C2 channels. IDS signatures can apply as well.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are Behavioral Indicators?

A

They are a combination of indicators, including other behaviors, to form a profile.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which indicator is which in this example:
-Using IP address to target sales
-Trojaned MS Word docs
-C2 is created to communicate to A.B.C.D.

A

1st: Behavioral
2nd: Computed
3rd: Atomic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an open mail relay and why is it important?

A

An open mail relay is a Simple Mail Transfer Protocol (SMTP) server configured in such a way that it allows anyone on the Internet to send e-mail through it, not just mail destined to or originating from known users. This is a way adversaries can keep sending spoof emails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are some ways adversaries can recon an organization.

A

They can do it through portscans, system enumeration, browsing company sites, pulling down PDF’s, and learning the structure of the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is weaponization?

A

The technique adversaries use to obfuscate shellcode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a single-phase exploit and a multi-phase exploit?

A

A single-phase exploit is the result of a compromised host behaving according to the attacker’s wishes. A multi-phase exploit involves delivery of a shellcode with the function of downloading more capable code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name two methods an adversary can exploit an enterprise.

A

Through hardware vulnerability and through human vulnerability “social engineering”.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a trouble and adversary may run into after installing their malware into the victim’s PC?

A

The tool they to exploit may not be compatible for usage therefore they may not get a response back from it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Name a few goals adversaries have in mind with Actions on Objectives.

A

Exfiltrating data, data destructing, and causing denial of service.

17
Q

Define adversary persistence.

A

The act of maintaining a presence in the network, as well as repeatedly attempting to gain access to areas where presence isn’t established.

18
Q

Why is it important to document the cyber kill chain?

A

So that responders can reconstruct the path and tools adversaries used to exploit the enterprise. Tools that they used that were proven ineffective must be synthesized “reversed engineered” as well. Failure to do so makes responders ineffective.

19
Q

Why was the Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) constructed?

A

To describe the actions and adversary may take when operating inside an enterprise. Its designed to help describe post-compromise behavior. It also expands network defender’s knowledge on adversary TTP’s.

20
Q

What are the twelve categories in ATT&CK?

A

Initial Access, Execution, Persistence, Priviledge Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, Command & Control, Exfiltration, and Impact.

21
Q

The goal of FOR508 is…

A

Educate analysts adversary techniques and demonstrate how to find them with the tools given.

22
Q

What is an Indicator of Compromise (IOC)?

A

An IOC describes attacker tools and tradecraft using a precise language where humans and security tools can understand it.

23
Q

Two broad types of IOC’s are…

A

Host-based indicators and network-based indicators.

24
Q

Name four IOC languages and two tools for managing them.

A

Yara, Stix, OpenIOC, and Taxii. To manage, the tools are CRITS and MISP.