Section 3.27 Outsmarting Threat Actors Flashcards
Objectives 1.2 Summarise fundamental security concepts Objectives 2.1 Compare and contrast threat actors and motivations Objectives 2.2 Explain common threat vectors and attack surfaces
Outsmarting Threat Actors
DDt’s
One of the most effective ways to learn from the different threat actors that are attacking your network is to set up and utilise…
Deception and Disruption technologies
TTPs
Tactics, Techniques, and Procedures (TTPs)
Specific methods and patterns of activities or behaviors associated with a particular threat actor or group of threat actors
Idea is to learn the threat actors TTPs
Deceptive and Disruption Technologies
MCD DN
Technologies designed to mislead, confuse, and divert attackers from critical assets while simultaneously detecting and neutralising threats
4 common deceptive and disruption technology examples
1 Honeypots
D S/N
Decoy system or network set up to attract potential hackers to allow defenders to study their actions without any consequences
4 common deceptive and disruption technology examples
2 Honeynet
Network of honeypots to create a more complex system that is designed to mimic an entire network of systems to study threat actor behaviors
Servers
Routers
Switches
3 Honeyfiles
Decoy file placed within a system to lure in potential attackers - these watermarked files can help detect unauthorised access
4 Honeytokens
Piece of data or a resource that has no legitimate value or use but is monitored for access or use
Bogus URL
Fake passwords
signals an alarm for a potential security breach when used
5 examples BDDPS
Disruption Technologies and Strategies to help secure enterprise networks
- Bogus DNS entries: Fake Domain Name System entries introduced into your system’s DNS
server - Creating decoy directories: Fake folders and files placed within a system’s storage
- Dynamic page generation: Effective against automated scraping tools or bots trying to index or steal content from your organization’s website
- Use of port triggering to hide services: Security mechanism where specific services or ports on a network device remain closed until a specific outbound traffic pattern is detected
- Spoofing fake telemetry data: When a system detects a network scan is being attempted by an attacker, it can be configured to respond by sending out fake telemetry or network data