Attack Vectors and Cyber Kill Chain Flashcards

Attack Vectors and Cyber Kill Chain (30 cards)

1
Q

What is an attack vector?

A

A method or pathway that a threat actor uses to gain unauthorized access to a system or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a phishing email an example of?

A

A social engineering attack vector.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How can USB drives serve as attack vectors?

A

They can carry malware that activates when plugged into a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a common attack vector that exploits web applications?

A

SQL injection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which attack vector exploits unpatched software vulnerabilities?

A

Exploit kits or zero-day vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does Remote Desktop Protocol (RDP) become an attack vector?

A

If not secured properly, attackers can gain access through brute-force or credential stuffing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of attack vector is involved when attackers use malvertising?

A

The delivery of malware through online ads.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a watering hole attack?

A

Compromising a commonly visited site to target specific victims.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the risk of using outdated software?

A

It becomes an easy attack vector due to known vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is drive-by download?

A

Automatic download of malicious code when visiting a compromised website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the Cyber Kill Chain?

A

A framework that describes the stages of a cyber attack from planning to execution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the first phase of the Cyber Kill Chain?

A

Reconnaissance – gathering information about the target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What happens in the Weaponization phase of the Kill Chain?

A

The attacker creates a deliverable payload (e.g., malware) to exploit the target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the Delivery phase in the Kill Chain?

A

The attacker sends the payload to the target, e.g., via email, USB, or malicious link.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the Exploitation phase?

A

The malicious code is triggered, exploiting a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What happens in the Installation phase?

A

Malware is installed to maintain access and persistence.

17
Q

What is the purpose of the Command and Control (C2) phase?

A

Allows the attacker to remotely control the infected system.

18
Q

What is the final phase of the Kill Chain?

A

Actions on Objectives – attacker achieves their goal (e.g., data theft, destruction).

19
Q

Why is it useful to understand the Cyber Kill Chain in SOC operations?

A

It helps in identifying, interrupting, and mitigating attacks at each stage.

20
Q

Which phase of the Kill Chain involves creating custom malware for the target?

A

Weaponization.

21
Q

During which phase would firewall or IDS logs help detect activity?

A

Delivery or Command and Control.

22
Q

What tool might detect activity in the Exploitation phase?

A

An Endpoint Detection and Response (EDR) system.

23
Q

Which phase might involve privilege escalation techniques?

A

Actions on Objectives.

24
Q

At what phase is spear phishing typically used?

25
How can blue teams disrupt the Kill Chain during Reconnaissance?
By hiding system metadata and using honeypots or deception techniques.
26
What detection method is effective during the Installation phase?
Monitoring changes in system files or registry entries.
27
What is lateral movement, and in which Kill Chain phase does it occur?
Moving between systems to gain access – happens during Actions on Objectives.
28
What is a Kill Chain Break Point?
A point in the chain where defenders can stop the attack from progressing.
29
What phase may include the use of RATs (Remote Access Trojans)?
Command and Control.
30
What is the value of Kill Chain modeling for incident response teams?
It helps in prioritizing defenses and structuring responses across each attack phase.