THM - Unified Kill Chain
#thm
TryHackMe | Why Subscribe
- Threat modeling
- "Threat Modeling" is the process of:
- Identifying systems
- Assessing vulnerabilities
- Create a plan of action to secure those system within acceptable risk
- Put policies in place to prevent future vulnerabilities
- e.g., patch management, SDLC, awareness training, etc.
- "Threat Modeling" is the process of:
- The Unified Kill Chain
- Aims to compliment other cybersecurity frameworks
- The goal is to cover an entire attack, and recognizes that an attacker will move between links in a non-linear fashio
- The LM CKC framework really only focuses on malware delivery, and is primarily linear
- There are 18 "links" in the kill chain, and they are organized in three groups; In, Through, and Out
- In
- Details how an attacker attempts to gain and maintain access
- Through
- How an attacker might move through an organization
- Out
- How an attacker accomplishes objectives and exits the organization
- In
- In
- Reconnaissance
- MITRE Tactic TA0043
- Attacker aims to gather information about the target
- Weaponization
- MITRE Tactic TA0001
- Attacker configures the necessary infrastructure to perform the attack
- e.g. C2 Servers, etc.
- Social Engineering
- MITRE Tactic TA0001
- Attacker attempts to manipulate employees to perform actions to help in the attack
- Exploitation
- MITRE Tactic TA0002
- How an attacker takes advantage of a system vulnerability
- Persistence
- MITRE Tactic TA0003
- The techniques used by an adversary to maintain access to a system
- Defense Evasion
- MITRE Tactic TA0005
- Basically how an attacker avoids detection and defensive measures
- Command & Control
- MITRE Tactic TA0008
- Combines the efforts from Weaponization to establish communications between the adversary and target systems
- Pivoting
- MITRE Tactic TA0008
- How an adversary moves within a network to access other systems (for example, a fileshare without access to the internet)
- Reconnaissance
- Through
- Pivoting
- MITRE Tactic TA0008
- In the Through phase, Pivoting might be how an attacker uses a system as a staging and distribution site for malware
- Discovery
- MITRE Tactic TA0007
- The adversary gaining information about the systems they have access to; like Reconnaissance, but more keyed into the active investigation on target systems
- Privilege Escalation
- MITRE Tactic TA0004
- Attempts to gain elevated access (root, Local Administrator, users with specific access, etc.) on key systems
- Execution
- MITRE Tactic TA0002
- An attacker deploys the Weaponized code and infrastructure developed earlier.
- Credential Access
- MITRE Tactic TA0006
- This works with the Privilege Escalation stage, and employs tools for keylogging and credential dumping
- Lateral Movement
- MITRE Tactic TA0008
- Kind of a mix of Pivoting, Privilege Escalation, and Credential Access to move across networks and systems to access the targeted systems
- Pivoting
- Out
- Collection
- MITRE Tactic TA0009
- After all the prior activities, the adversary analyzes data sources in search of valuable data information to Exfiltrate
- Exfiltration
- MITRE Tactic TA0010
- Adversary seeks to steal the data, which would be compressed and encrypted to avoid detection and DLP
- The C2 channel and tunnel is often used in this process
- Impact
- MITRE Tactic TA0040
- If the goal is to interrupt normal business or destroy assets, this technique describes those activities
- Objectives
- This is a broad term that's just "The primary objects the adversary originally sought to complete"
- Collection
Random shit:
143.110.250.149