Module 2: Attacker Methodology Introduction
Last updated
Last updated
Most ingress attacks pass through the DMZ due to it facing the internet.
Deployment Environments separate the development and production environments.
The development (dev) server allows for safely writing and testing code before moving it to production. If there is a catastrophic failure, no impact on users or business will occur. If compromised, no real information is leaked.
The staging server is a near-perfect replication of the production server to ensure production will behave as expected. It can be used to emulate potential updates with additional testing prior to being pushed to production.
The production (prod) server is the live system that user's interact with. There is no guarantee of being invulnerable, but this entire process helps mitigate issues.
Edge devices provide connectivity between networks. Core devices pass network traffic through to intended destinations.
A VPN provides the means to securely access a private network while being geographically removed from it. As with anything else, it must be properly configured and maintained to ensure safe and secure business operations.
VPN connectivity also enables the geographic distribution of remote sites. This allows enterprises to expand their operations.
Remote sites are just as critical as main offices due to the connection they have via the VPN.
The inclusion of the word "chain" means that each phase depends on the next. If interrupted, the APT cannot complete their objective.
The phases of the Lockheed Martin Kill-Chain:
Reconnaissance
Weaponization
Delivery
Exploitation
Installation
Command & Control (C2)
Actions on Objectives
The fourteen enterprise-specific tactics:
Reconnaissance
Resource Development
Initial Access
Execution
Persistence
Privilege Escalation
Defense Evasion
Credential Access
Discovery
Lateral Movement
Collection
Command and Control
Exfiltration
Impact
Each tactic has techniques and sub-techniques.