2B. Attack Frameworks and Indicator Management obj 1.1, 1.2 Flashcards

1
Q

Briefly describe reputational data

A

Blacklists of known threat sources (e.g., IP address ranges, malware signatures, domains)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are IoCs?

A

Residual signs of an asset that has been successfully compromised/breached (e.g., IP addresses, rogue hardware, unknown port/protocol usage, registry/file system changes)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is behavioural threat research?

A

The correlation of IoCs into attack patterns e.g., attacker might be using new IP address, but attack pattern resembles that of past attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the stages of the Cyber Kill Chain?

A

1) Reconnaissance
2) Weaponisation
3) Delivery
4) Exploitation
5) Installation
6) C2
7) Actions on objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Identify and describe stage one of the Cyber Kill Chain

A
  1. Reconnaissance. During this stage, the adversary is gathering intelligence about their target. This can be open-source or direct acquisition (via scanning). Vulns may be identified.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Identify and describe stage two of the Cyber Kill Chain

A
  1. Weaponisation. In this stage, malware is combined with an exploit to create a payload that can be delivered to the target.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Identify and describe stage three of the Cyber Kill Chain

A
  1. Delivery. The payload is delivered to the target via a method (e.g., phishing, USB, water holing)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Identify and describe stage four of the Cyber Kill Chain

A
  1. Exploitation. The payload is executed and exploits a vulnerability. e.g., this can be initiated by a victim being tricked into running code via a phishing email, or a drive-by-download
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Identify and describe stage five of the Cyber Kill Chain

A
  1. Installation. Remote access tools/backdoors are installed to achieve persistence.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Identify and describe stage six of the Cyber Kill Chain

A
  1. C2. The payload establishes a connection to a remote server that the adversary can use to gain remote access and install further tools/malware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Identify and describe stage seven of the Cyber Kill Chain

A

Actions on objectives. The adversary takes actions to accomplish their goals (e.g., data exfiltration)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does STIX stand for?

A

Structured Threat Information eXpression

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is STIX used for?

A

STIX is a language used to share CTI information in a standardised format. STIX v1 uses XML, while STIX v2 uses JSON.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are some of the STIX domain objects?

A

Attack pattern,
malware,
threat actor,
tools,
goals,
motivations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does TAXII stand for?

A

Trusted Automated eXchange of Indicator Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is TAXII used for?

A

It is a protocol used for securely transporting/exchanging CTI information that uses the STIX syntax between different organisations and systems.

17
Q

Examples of how STIX can improve an organisation’s security

A

1) An organisation may use STIX data to identify patterns of suspicious activity on their network, and then respond to the activity with appropriate actions.
2) STIX data can be used to identify and prioritise vulnerabilities in an organisation’s network or system.

18
Q

Briefly describe OpenIOC

A

It is an XML-based framework that provides a standardised approach for describing artefacts found during an investigation. IOCs are made up of IOC Metadata (e.g., author and name of the IOC), References (e.g., case number, version of malware, etc), and the Definition (i.e., the content of the IOC e.g., the MD5, registry path, etc)