SOC LEVEL 1
  • Path 1
    • Cyber Defense Framework
      • Security Analyst Intro
      • Pyramid of Pain
      • Cyber Kill Chain
      • Unified Kill Chain
      • Diamond Model
      • MITRE
  • PATH 2
    • Cyber Threat Intelligence
      • Intro to Cyber Threat Intel
      • Threat Intelligence Tools
      • Yara
      • OpenCTI
      • MISP
  • PATH 3
    • Network Security and Traffic Analysis
      • Traffic Analysis Essentials
      • Snort
      • Snort Challenge - The Basics
      • Snort Challenge - Live Attacks
      • NetworkMiner
      • Zeek
      • Zeek Exercises
      • Brim
      • Wireshark: The Basics
      • Wireshark: Packet Operations
      • Wireshark: Traffic Analysis
  • PATH 4
    • Endpoint Security Monitoring
      • Intro to Endpoint Security
      • Core Windows Processes
      • Sysinternals
      • Windows Event Logs
      • Sysmon
      • Osquery: The basics
      • Wazuh
  • PATH 5
    • Security Information and Event Management
      • Introduction to SIEM
      • Investigating with ELK 101
      • ItsyBitsy
      • Splunk: Basics
      • Incident Handling with Splunk
      • Investigating with Splunk
      • Benign
  • PATH 6
    • Digital Forensics and Incident Response
      • DFIR: An Introduction
      • Windows Forensics 1
      • Windows Forensics 2
      • Linux Forensics
      • Autopsy
      • Redline
      • Kape
      • Volatility
      • Velociraptor
      • TheHive Project
      • Intro to Malware Analysis
  • PATH 7
    • Phishing
      • Phishing Analysis Fundamentals
      • Phishing Emails in Action
      • Phishing Analysis Tools
      • Phishing Prevention
      • The Greenholt Phish
Powered by GitBook
On this page
  • Threat Modelling
  • The Unified Kill Chain
  • Phase: In (Initial Foothold)
  • Phase: Through (Network Propagation)
  • Phase: Out (Action on Objectives)
  1. Path 1
  2. Cyber Defense Framework

Unified Kill Chain

The Unified Kill Chain is a framework which establishes the phases of an attack, and a means of identifying and mitigating risk to IT assets.

PreviousCyber Kill ChainNextDiamond Model

Last updated 2 years ago

Threat Modelling

Threat modelling is a series of steps to improve the security of a system by identifying risk. This is done by the following:

  1. Identifying the systems or applications needing to be secured and their function in the environment

  2. Assessing what vulnerabilities and weaknesses could be exploited

  3. Developing a plan of action to secure the highlighted vulnerabilities

  4. Establishing policies to prevent the vulnerabilities from reoccurring where possible

Threat modelling reduces risk by creating high-level overview of IT assets (a piece of hardware or software) and procedures to resolve vulnerabilities. Frameworks specifically used in threat modelling include STRIDE, DREAD and CVSS.

The Unified Kill Chain

Some benefits to the Unified Kill Chain are its modernization, detailed 18 phases, entire attack coverage, and more realistic attack scenarios such as reoccurring phases.

In what year was the Unified Kill Chain framework released?

2017

According to the Unified Kill Chain, how many phases are there to an attack?

18

What is the name of the attack phase where an attacker employs techniques to evade detection?

Defense Evasion

What is the name of the attack phase where an attacker employs techniques to remove data from a network?

Exfiltration

What is the name of the attack phase where an attacker achieves their objectives?

Objectives

Phase: In (Initial Foothold)

An attacker will use multiple tactics during this phase to investigate a system for exploitable vulnerabilities to gain access to a system or networked environment and sometimes creating a form of persistence.

  • Passive or active techniques employed to gather information relating to target such as:

    • Discovering systems and services running

    • Finding contact lists or employees that can be impersonated for social-engineering and phishing attacks

    • Looking for potential credentials for later stages

    • Understating the network topology and other networked systems to pivot

Adversary setting up necessary infrastructure to perform attacks ( C2 server or a system able to catch reverse shells and deliver payloads).

Techniques an used to manipulate employees to perform aiding actions in the attack such as:

  • Getting a user to open a malicious attachment

  • Impersonating a web page to capture credentials

  • Calling or visiting the target while impersonating a user for privileged access or behaviors

Weaknesses or vulnerabilities present in a system an attacker takes advantage such as:

  • Uploading and executing a reverse shell to a web application

  • Interfering with an automated script on a system to execute code

  • Abusing a web application vulnerability to execute code on the system it is running on

Techniques used to maintain access to a system after initial foothold such as:

  • Creating a service on a target system to allow regained access

  • Adding the target system to a C2 server to execute commands remotely

  • Leaving backdoors that execute when certain actions occur

Used to evade defensive measures put in place in a system or network such as:

  • Web application firewalls

  • Network firewalls

  • Anti-virus systems on the target machine

  • Intrusion detection systems

This phase gives the defensive team information to improve their defense systems and to form a response.

This phase combines the adversary's efforts from the Weaponization stage to establish communications to and from the target system. Establishing command and control assists in achieving actions on objectives such as:

  • Executing commands

  • Steal data and credentials

  • Pivot to other systems in network

Used to reach other systems within a network which are not otherwise accessible. Systems not directly reachable often contain valuable data or have weaker security.

What is an example of a tactic to gain a foothold using emails?

Phishing

Impersonating an employee to request a password reset is a form of what?

Social Engineering

An adversary setting up the Command & Control server infrastructure is what phase of the Unified Kill Chain?

Weaponization

Exploiting a vulnerability present on a system is what phase of the Unified Kill Chain?

Exploitation

Moving from one system to another is an example of?

Pivoting

Leaving behind a malicious service that allows the adversary to log back into the target is what?

Persistence

Phase: Through (Network Propagation)

After establishing a successful foothold on a target network, and attacker would seek additional access and privileges by setting up a base on of the systems as a pivot point.

Once an attacker has system access, it would be used as the staging site and tunnel between their command operations and the victim's network. This would also be used to distribute malware and backdoors at later stages.

A knowledge base would be built from the active users, granted permissions, applications and software in use, web browser activity, files, directories/network shares, and system configurations.

To gain more prominent permissions in the pivot system, the adversary would leverage information on the present accounts with vulnerabilities and misconfigurations to elevate access to the following superior levels:

  • SYSTEM/ ROOT

  • Local Administrator

  • A user account with Admin-like access

  • A user account with specific access or functions

To facilitate a recurring presence on the system and uphold their persistence, the adversary would deploy malicious code using the pivot system as their host such as:

  • Remote trojans

  • C2 scripts

  • Malicious links

  • Scheduled tasks

Alongside the Privilege Escalation stage, the adversary would attempt to steal account names and passwords to lessen the possibility of detection by using legitimate credentials.

To achieve their primary objective, the adversary can now attempt to move through the network and jump to other targeted systems with the credentials and elevated privileges.

As a SOC analyst, you pick up numerous alerts pointing to failed login attempts from an administrator account. What stage of the kill chain would an attacker be seeking to achieve?

Privilege escalation

Mimikatz, a known attack tool, was detected running on the IT Manager's computer. What is the mission of the tool?

Credential dumping

Phase: Out (Action on Objectives)

By gathering all data of interest, the adversary compromises the confidentiality of the data.

By stealing data packaged using encryption and compression to avoid detection, the adversary elevates compromise. The C2 channel and tunnel established in earlier phases will be used in this process.

To compromise integrity and availability, the adversary may interrupt or destroy data assets by:

  • Removing account access

  • Disk wipes

  • Data encryption (ransomware)

  • Defacement

  • Denial of Service (DoS)

Objectives

From gained power and access, the adversary can achieve their primary goal with the attack

While monitoring the network as a SOC analyst, you realize that there is a spike in the network activity, and all the traffic is outbound to an unknown IP address. What stage could describe this activity?

Exfiltration

Personally identifiable information (PII) has been released to the public by an adversary, and your organization is facing scrutiny for the breach. What part of the CIA triad would be affected by this action?

Confidentiality

Reconnaissance ()

Weaponization ()

Social Engineering ()

Exploitation ()

Persistence ()

Defense Evasion ()

Command & Control ()

Pivoting ()

Pivoting ()

Discovery ()

Privilege Escalation ()

Execution ()

Credential Access ()

Lateral Movement ()

Collection

Exfiltration ()

Impact ()

MITRE Tactic TA0043
MITRE Tactic TA0001
MITRE Tactic TA0001
MITRE Tactic TA0002
MITRE Tactic TA0003
MITRE Tactic TA0005
MITRE Tactic TA0011
MITRE Tactic TA0008
MITRE Tactic TA0008
MITRE Tactic TA0007
MITRE Tactic TA0004
MITRE Tactic TA0002
MITRE Tactic TA0006
MITRE Tactic TA0008
MITRE Tactic (TA0009)
MITRE Tactic TA0010
MITRE Tactic TA0040
https://tryhackme-images.s3.amazonaws.com/user-uploads/5de96d9ca744773ea7ef8c00/room-content/6cdfd3aba41ee1b942b5a1537a1dc1ad.png