Test 1 Flashcards
Pass
What are the four use cases for the MITRE ATT&CK Framework?
Threat intelligence
Detection
and analysis
Adversary emulation
and red teaming
Assessment and engineering
How many levels of maturity are associated with each use case of the MITRE ATT&CK Framework?
If you worked for a small- to medium-sized business, which of the maturity levels of MITRE ATT&CK Framework
would you more than likely implement and why
3 levels of maturity.
For a small to medium
sized business you should consider levels 1 to 2
What is the ATT&CK Navigator?
It helps do annotation and navigation for different attack techniques.
Tools such as Sysmon, Windows Event Logs and EDR platforms can be used to perform what type of defensive actions?
Process command line, file, and registry monitoring.
What is Adversary Emulation? How does it differ from a Purple Team engagement?
Trying to evade your created analytics by executing the types of attacks and evasions that we know adversaries use in the real world.
Purple Teaming involves a back and forth between red team and the developers to try and update the analytic to seek different ways to stay safe from a certain attack
What is the Atomic Red Team project?
An open source project that provides red team content that aligns with ATT&CK that can be
used to test analytics
What is the Pyramid of Pain?
The Pyramid of Pain defines levels of indicators, each escalating in difficulty for adversaries to alter
What are the six levels of the Pyramid of Pain? Which is the most difficult to defend against.
TTPs
Tools
Network/Host Artifacts
Domain names
IP address
Hash Values
The most difficult to detect and protect against are TTPs
What pentest requires you to act like an insider?
Internal penetration test
What is an external pentest?
Simulate an attack via the internet
What is a white hat hacker?
An individual who uses hacking skills to identify security vulnerabilities in hardware, software or networks. Does so with respect of the law.
What is a black hat hacker?
A black hat is a computer hacker who violates laws or ethical standards for nefarious purposes, such as cybercrime, cyberwarfare, or malice.
What is a greyhat hacker?
A computer hacker who may sometimes violate laws or typical ethical standards, but usually does not have the malicious intent typical of a black hat hacker.
What is a red team?
Ethical hackers who are authorized by an organization to emulate real attackers’ tactics, techniques and procedures (TTPs) against your own systems
What is a blue team?
The group responsible for defending an enterprise’s use of information systems by maintaining its security posture against a group of mock attackers (i.e., the Red Team).
What is a purple team?
An org is attacked and defended multiple types, strengthening an org’s defense with defense.
What is Netcraft and what do they offer?
Netcraft is a company that logs the uptime of websites and makes queries about the underlying software.
IE… When a website was first seen, how it was registered, and What OS and server it is running.
What is Whois?
Gives information about a website like the owner, register, address of registrar and register.
Nslookup?
Provides IP’s and addresses, can also be used to search for mail servers.
What is theHarvester?
theHarvester searches Google, bing, to find email addresses.
What are the phases of the COMPTIA penetration testing process?
Planning and Scoping (asking the client about the rules of the engagement (subnets, systems))
Information Gathering (When engagement is stared, what relevant info can be gathered about the target organization to make them easier to attack)
Vulnerability Identification (What services are running on open ports and can we take advantage of them)
Attacking and Exploiting (How can access be gained using the vulnerabilities discovered)
Reporting and Communication results (Showing the client gaps in their security and helping them understand what is wrong and how to correct it)
What is a vulnerability assessment?
Gathers data from public resources and various tools to identify open ports and identify potential vulnerabilities that can be exploited.