Student Text Flashcards
What is aimed to improve understanding of attackers TTPs?
Lockheed Martin’s Cyber Kill Chain
What are the categories in Lockheed Martins Cyber Kill Chain
- Reconnaissance
- Weaponization
- Delivery
- Exploitation
- Installation
- Command & Control
- Actions on Objectives
What describes the actions an adversary would take against a target, is designed for network defenders, and has the later stages broken into 11 tactic categories?
MITRE ATT&CK Matrix
What are the methods for footprinting?
- whois
- dig
- nslookup
- social networking sites
The Hacker Methodology
- Footprinting
- Scanning
- Enumeration
- Gaining access
- Escalating privileges
- Pilfering data
- Covering tracks
- Creating backdoors
- Actions on objectives
What is passive collection of data about a target?
Footprinting
What is bulk assessment and identification of target and includes direct interaction?
Scanning
What are the methods for scanning?
What is aggressively probing and looking for vulnerabilities?
Enumeration
What are the methods of enumeration?
- Service version detection
- Operating system detection
- Banner grabbing
What is establishing a foothold on the target system?
Gaining access
What are the methods for gaining access?
- Username/passwords
- Brute force password guessing
- Remote code execution (metasploit/phishing)
What is taking full control of a system?
Escalating privileges
What are the methods for escalating privileges?
- Hashdump
- Password cracking
- Phishing
What is gathering information for a target system?
Pilfering data
What are the methods for pilfering data?
- Copy data don’t move
- System configs
- Shares
- ARP tables
What is making sure users and admins don’t know we were there?
Covering tracks