Module 01 RealAttackScenario
Module 01 RealAttackScenario
Cybersecurity Career
BY A M R T HA B ET
Let me Introduce Myself
• My name is Amr Thabet
• I was working in Symantec for 3 years
• Now I’m working in Tenable (Nessus
Scanner)
• Author of “Mastering Malware Analysis”
book
• Speaker at DEFCON, Hack In Paris, VB
Conference and others
• Module 01: How Real Attacks Look
like? (Attacker’s Mindset)
Source: Kingspan.com (This picture is not for Company X. Just used for imagination)
Attacking Company X: The Attack
Process
The Goal of This Attack
• The ultimate goal for the attacker is to get a
domain admin account.
• A Domain Admin has a full access over the
domain controller (DC) and all resources in the
network
• From there, the attacker can reach most of the
needed systems for accessing sensitive
information
• Also a good access to the servers and their
backups for an effective ransomware encryption.
Attacking Company X: Reconnaissance
• First week, the attackers started mapping the employees
of this organization.
• Collect their name, last name, email, their department
and job position.
• All these info will help them deliver a highly targeted spear-
phishing attack
• You can develop your own tools with unknown signatures and
customized network communication (Hard to detect)
Step 5: Execute the attack
Resources:
• Check MITRE ATT&CK APT 3 Simulation
https://attack.mitre.org/docs/APT3_Adversary_Emulation_Plan.pdf
The Execution
The Attack Cycle
Source: public.navy.mil
Initial Access – Spear-phishing Demo
• Demo Example: Malicious Document With Macro
APT/Adversary Simulation Frameworks
• Caldera: A cyber security framework designed to easily run
autonomous breach-and-simulation exercises. It can also be
used to run manual red-team engagements or automated
incident response. (Free)