- What is watering hole attack?
- What PowerShell tool did menuPass use to gain code execution?
- What is the ATT&CK framework?
- What technique is drive by compromise?
- What is Mitre attack Navigator?
- What is a Mitre in the Bible?
- What is threat hunting in cyber security?
- What is supply chain compromise?
- How does Mitre ATT&ck help security operations?
What is watering hole attack?
What is a Watering Hole Attack.
A watering hole attack is a targeted attack designed to compromise users within a specific industry or group of users by infecting websites they typically visit and luring them to a malicious site.
The end goal is to infect the users computer and gain access to the organizations network..
What PowerShell tool did menuPass use to gain code execution?
vbs to execute commands. menuPass has used malicious macros embedded inside Office documents to execute files. menuPass uses PowerSploit to inject shellcode into PowerShell.
What is the ATT&CK framework?
The MITRE ATT&CK™ framework is a comprehensive matrix of tactics and techniques used by threat hunters, red teamers, and defenders to better classify attacks and assess an organization’s risk. … Organizations can use the framework to identify holes in defenses, and prioritize them based on risk.
What technique is drive by compromise?
In this post we are going to explain Drive-by Compromise technique that provides “Initial Access” or a foothold within a network. This technique does not require any action from the user (victim), beyond simply visiting a compromised site that contains an exploit that silently compromises a vulnerable browser.
What is Mitre attack Navigator?
MITRE ATT&CK® is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. … With the creation of ATT&CK, MITRE is fulfilling its mission to solve problems for a safer world — by bringing communities together to develop more effective cybersecurity.
What is a Mitre in the Bible?
The priestly mitre or turban (Hebrew: מִצְנֶפֶת mitznefet) was the head covering worn by the High Priest of Israel when he served in the Tabernacle and the Temple in Jerusalem.
What is threat hunting in cyber security?
Cyber threat hunters are information security professionals who proactively and iteratively detect, isolate, and neutralize advanced threats that evade automated security solutions. Cyber threat hunters constitute an integral part of the rapidly growing cyber threat intelligence industry.
What is supply chain compromise?
Supply chain compromise refers to the manipulation of products or delivery mechanisms for the purpose of information or system compromise before the final consumer receives said products. This compromise can negatively impact any hardware or software component and even update channels.
How does Mitre ATT&ck help security operations?
MITRE created ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) as a solution to help teams achieve more effective cybersecurity. The framework enables the sharing of adversarial behaviors across the attack lifecycle and provides a common taxonomy for threat analysis and research.