Soc Analyst Room Three
Soc Analyst Room Three
Threat modelling is about identifying risk and essentially boils down to:
- Identifying what systems and applications need to be secured and what function
they serve in the environment ("identifying the assets")
- Assessing what vulnerabilities and weaknesses these systems and applications may
have and how they could be potentially exploited
- Creating a plan of action to secure these systems and applications from the
vulnerabilities highlighted
- Putting in policies to prevent these vulnerabilities from occurring again where
possible (for example, implementing a software development life cycle (SDLC) for an
application or training employees on phishing awareness).
STRIDE, DREAD and CVSS (to name a few) are all frameworks specifically used in
threat modelling. If you are interested to learn more, check out the “Principles of
Security” room on TryHackMe.
To continue from the previous task, Paul Pols' Unified Kill Chain, published in
2017, aims to complement (not compete with) other cybersecurity kill chain
frameworks, such as Lockheed Martin’s and MITRE’s ATT&CK.
The UKC states that there are 18 phases to an attack.
pivoting Tunneling traffic through a controlled system to other systems that are
not directly accessible.
Techniques an attacker may specifically use for evading detection or avoiding other
defenses.
Techniques that allow attackers to communicate with controlled systems within a
target network.
Tunneling traffic through a controlled system to other systems that are not
directly accessible.
Techniques that allow an attacker to gain knowledge about a system and its network
environment.
The result of techniques that provide an attacker with higher permissions on a
system or network.
Techniques that result in execution of attacker-controlled code on a local or
remote system.
Techniques resulting in the access of, or control over, system, service or domain
credentials.
Techniques that enable an adversary to horizontally access and control other remote
systems.
Techniques used to identify and gather data from a target network prior to
exfiltration.
Techniques that result or aid in an attacker removing data from a target network.
The UKC highlights a much more realistic attack scenario. Various stages will often
re-occur. For example, after exploiting a machine, an attacker will begin
reconnaissance to pivot another system.
Other frameworks do not account for the fact that an attacker will go back and
forth between the various phases during an attack.
Malware often tries to keep a footprint in the system such that it keeps running
even after a system restart. This is called persistence. For example, If a malware
adds itself to the startup registry keys, it will persist even after a system
restart.
credential dumping exploits vulnerabilities in your RAM to steal and copy your
credentials. Once your credentials are accessed, these data are said to have been
“dumped”.
credential stuffing, a type of cyber attack that “stuffs” stolen credentials into
multiple websites. Essentially, credential stuffing is akin to “throwing spaghetti
on the wall and seeing which one sticks,”
Lateral movement : With the credentials and elevated privileges, the adversary
would seek to move through the network and jump onto other targeted systems to
achieve their primary objective. The stealthier the technique used, the better.
Lateral Movement: Refers to the process of moving across systems or devices within
the same compromised network. The attacker gains access to one system and then
spreads to other systems in the same network to find more valuable information,
escalate privileges, or deepen their foothold.
Pivoting: Involves the attacker using a compromised system (often one inside a
segmented network) as a bridge or relay to access other networks that would
otherwise be inaccessible. It allows the attacker to "pivot" into other network
segments or VLANs from the initial compromised machine.
other definitions...
Network pivoting is the act of gaining access to other systems that are not
directly accessible.
This can be on other networks or on network edge points, or on the same network but
giving the tester access to new systems that weren’t exploitable.
IOC vs IOA
The social-political component describes the needs and intent of the adversary, for
example, financial gain, gaining acceptance in the hacker community, hacktivism, or
espionage. (The scenario can be that the victim provides a “product”, for example,
computing resources & bandwidth as a zombie in a botnet for crypto mining
(producing new cryptocurrencies by solving cryptographic equations through the use
of computers) purposes, while the adversary consumes their product or gets
financial gain.)
Technology – the technology meta-feature or component highlights the relationship
between the core features: capability and infrastructure. The capability and
infrastructure describe how the adversary operates and communicates. A scenario can
be a watering-hole attack which is a methodology where the adversary compromises
legitimate websites that they believe their targeted victims will visit.
The technology meta-feature highlights how the capability (the adversary's tools
and techniques) and infrastructure (the platforms they use) work together to enable
the adversary’s operations and facilitate communication during an attack.
For example, an attacker might use a specific malware tool (capability) that
communicates back to a command-and-control (C2) server (infrastructure) to receive
instructions or exfiltrate data.
The Diamond Model is a scientific method to improve the efficiency and accuracy of
intrusion analysis. With this in your arsenal, you will have opportunities to
leverage real-time intelligence for network defence and predict adversary
operations.
Real-time intelligence involves the continuous gathering of relevant data from
various sources like network traffic, system logs, and endpoint sensors. Tools such
as Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), and
Security Information and Event Management (SIEM) platforms collect, analyze, and
correlate data in real-time.
There are several PDF related vulnerabilities and exploits that allow pdfs to carry
viruses just to name a few
One Click PDF reader exploit - An attacker can gain access to your system simply
with you clicking a .pdf file containing a virus provided that your pdf reader has
a vulnerability
PDF containing malicious scripts - An attacker can gain access to your system when
you open or interact with a .pdf file that contains malicious javascript code. This
is different from the one above as it does not exploit the pdf reader but instead
the contents that make up the pdf file.
Malicious content in PDFs - Not exactly a virus but the way it works is that the
user is tricked into performing some action like clicking on a link in the pdf file
that downloads a virus or submitting some form.
Unknown exploits - Well you dont know what you dont know, there are probably
exploits made by groups or nation states that you can find on the dark web that
work on the latest version of adobe which allows you to gain full access to your
machine/phones that work simply by downloading a pdf file or opening a pdf file.
To answer your actual question, I assume you mean tracking a phone's location. To
do that you need access to the phone's location service. You could program almost
any mobile app to request access to the phone's location service. Whether the
phone's settings allow an app to arbitrarily access that service is dependent on
how the user has it configured. Most phones open PDFs in the browser and modern
browsers would not allow malicious files/code to be arbitrarily executed, so using
a PDF as a vector to deliver a payload to phone doesn't make sense. Websites and
web applications, however, can (and often do) access location services. Again, if
the user has the phone's location services to implicitly deny access or request
access, this doesn't seem like it would be very effective.