Podcast
Questions and Answers
What is one of the primary actions an attacker can perform during the actions on objectives phase?
What is one of the primary actions an attacker can perform during the actions on objectives phase?
- Restore system functionality post-attack
- Collect information and execute data exfiltration (correct)
- Enhance perimeter security measures
- Establish initial access to the target system
What does the MITRE ATT&CK framework specifically categorize?
What does the MITRE ATT&CK framework specifically categorize?
- Individual users and their credentials
- Policies for incident response
- Techniques used in cyber attacks (correct)
- Physical security vulnerabilities
Which of the following is NOT one of the core features in the Diamond Model of Intrusion Analysis?
Which of the following is NOT one of the core features in the Diamond Model of Intrusion Analysis?
- Adversary
- Infrastructure
- Victim
- Attacker motivation (correct)
Why do some organizations view the Kill Chain model as too simplistic?
Why do some organizations view the Kill Chain model as too simplistic?
Which aspect does the Diamond Model of Intrusion Analysis help to analyze?
Which aspect does the Diamond Model of Intrusion Analysis help to analyze?
What does the term Indicator of Compromise (IoC) primarily refer to?
What does the term Indicator of Compromise (IoC) primarily refer to?
Why is correlating multiple IoCs essential in threat analysis?
Why is correlating multiple IoCs essential in threat analysis?
What type of detection may struggle against advanced adversary tactics?
What type of detection may struggle against advanced adversary tactics?
Which of the following is NOT identified as an indicator of compromise?
Which of the following is NOT identified as an indicator of compromise?
What do TTPs in behavioral threat research stand for?
What do TTPs in behavioral threat research stand for?
How might a Security Operations Center (SOC) analyst identify a threat?
How might a Security Operations Center (SOC) analyst identify a threat?
Which of the following is a characteristic of behavioral threat research?
Which of the following is a characteristic of behavioral threat research?
Which of the following indicators could suggest a DDoS attack?
Which of the following indicators could suggest a DDoS attack?
What phase of the Kill Chain involves data exfiltration and network monitoring?
What phase of the Kill Chain involves data exfiltration and network monitoring?
Which method is NOT used for delivering the weaponized code to the target?
Which method is NOT used for delivering the weaponized code to the target?
In the Kill Chain, which step directly follows the Weaponization phase?
In the Kill Chain, which step directly follows the Weaponization phase?
What is the main goal of the Reconnaissance phase in the Kill Chain?
What is the main goal of the Reconnaissance phase in the Kill Chain?
What role does the Command and Control (C2) server play in the Kill Chain?
What role does the Command and Control (C2) server play in the Kill Chain?
During which phase of the Kill Chain is the payload code created?
During which phase of the Kill Chain is the payload code created?
Which of the following could indicate the presence of malware on a device?
Which of the following could indicate the presence of malware on a device?
What tactic might an attacker use during the Reconnaissance phase to avoid detection?
What tactic might an attacker use during the Reconnaissance phase to avoid detection?
Flashcards
Data exfiltration
Data exfiltration
The attacker steals data from the target system and sends it to a remote location
MITRE ATT&CK
MITRE ATT&CK
A framework that categorizes cyberattack techniques by tactics and unique IDs.
Kill Chain
Kill Chain
A model of cyberattacks, focused on perimeter security.
Diamond Model
Diamond Model
Signup and view all the flashcards
CIA Triad
CIA Triad
Signup and view all the flashcards
Malware Indicators
Malware Indicators
Signup and view all the flashcards
Network Reconnaissance
Network Reconnaissance
Signup and view all the flashcards
Reconnaissance (Kill Chain)
Reconnaissance (Kill Chain)
Signup and view all the flashcards
Weaponization (Kill Chain)
Weaponization (Kill Chain)
Signup and view all the flashcards
Delivery (Kill Chain)
Delivery (Kill Chain)
Signup and view all the flashcards
Exploitation (Kill Chain)
Exploitation (Kill Chain)
Signup and view all the flashcards
Command and Control (C2)
Command and Control (C2)
Signup and view all the flashcards
Indicator of Compromise (IoC)
Indicator of Compromise (IoC)
Signup and view all the flashcards
Examples of IoCs
Examples of IoCs
Signup and view all the flashcards
Correlating IoCs
Correlating IoCs
Signup and view all the flashcards
Threat Research
Threat Research
Signup and view all the flashcards
Behavioral Threat Research
Behavioral Threat Research
Signup and view all the flashcards
TTPs
TTPs
Signup and view all the flashcards
DDoS attack
DDoS attack
Signup and view all the flashcards
Static Malware Signature
Static Malware Signature
Signup and view all the flashcards
Study Notes
CySA+ 2B: Attack Frameworks and Indicator Management
- Classifying threat actors: Understanding adversary motivations and capabilities is crucial. Sophisticated tools are needed due to the diverse nature of threat actors. Attack frameworks can help categorize and analyze indicators of compromise (IoCs).
- Indicators of Compromise (IoC): IoCs are residual signs that an asset or network has been successfully attacked. They can be specific (e.g., malware signatures) or require analyst interpretation (e.g., unusual data downloads). Analysts must judge, but correlating multiple IoCs improves accuracy.
- Types of IoCs: IoCs include unauthorized software, suspicious files/emails, suspicious registry changes, unknown ports/protocols, unusual bandwidth usage, rogue hardware, and service disruptions.
- Threat Research: Signature-based detection may not identify sophisticated adversary tactics. Threat research has evolved beyond static signatures to understand patterns in adversary behavior. This behavioral analysis helps identify tactics, techniques, and procedures (TTPs).
- Behavioral TTPs: Some TTPs to look for include DDoS attacks (increased network traffic), viruses/worms (higher CPU/memory use), network reconnaissance (port scans), and data exfiltration (spikes in data transfer).
Kill Chain
- Kill Chain Overview: A framework outlining the steps attackers usually take to achieve their objectives (e.g., Lockheed Martin Kill Chain). Seven steps are included: Reconnaissance, Weaponization, Delivery, Exploitation, Installation, Command and Control, and Actions on Objectives.
- Reconnaissance: Attackers stealthily assess target systems and vulnerabilities.
- Weaponization: Attackers create the tools/code tailored to exploit vulnerabilities.
- Delivery: Attackers deliver the malware to the target. Common methods include email attachments, USB drives, and other means of transferring the weaponized code.
- Exploitation: The delivered malware is executed on the target system.
- Installation: The malicious code establishes persistence on the target system.
- Command and Control (C2): The attacker establishes communication to control the compromised system; a C2 server is used as the control point for various malware.
- Actions on Objectives: Attackers use access to collect and exfiltrate data or other malicious actions.
MITRE ATT&CK Framework
- Alternative to Kill Chain for More Modern Attacks: Some organizations find the Kill Chain too basic for modern threats.
- MITRE ATT&CK Framework: A more nuanced framework that tags specific adversary tactics, techniques, and procedures (TTPs). Includes categories like target selection, initial access, persistence, lateral movement, and command and control.
- Importance of the Framework: The framework helps identify and categorize specific actions that attackers might take for more efficient threat response.
Diamond Model of Intrusion Analysis
- Analysis of Intrusion Events: This model helps analyze intrusion events focusing on adversary, capability, infrastructure, and victim.
- Graph Representation: The model uses a diamond shape to visualize the four core aspects of an intrusion event.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.