当前位置:网站首页>Att & CK preliminary understanding
Att & CK preliminary understanding
2022-07-28 22:30:00 【sec0nd_】
List of articles
ATT&CK background
MITRE It is a research institution funded by the U.S. government , The company is 1958 Years from MIT separate from , And participated in many commercial and top secret projects . It includes developing FAA Air traffic control system and AWACS Airborne radar system .MITRE At the National Institute of standards and Technology (NIST) Has engaged in a large number of network security practices under the support of .MITRE stay 2013 Introduced in the ATT&CK Model .
ATT&CK What is it?
MITRE ATT&CK It is a well planned knowledge base and model for the behavior of network opponents , It reflects the various stages of the opponent's attack life cycle and their known target platforms .ATT&CK Focus on how external rivals compromise and operate in Computer Information Networks .
It originated from a project , The project records and classifies the post invasion attacks against Microsoft Windows Opponent tactics of the system 、 Technology and procedures (TTPs), To improve the detection of malicious behavior . Later it developed to include Linux and macOS, And expand to cover behaviors that lead to environmental compromise , And key areas of Technology , Like mobile devices 、 Cloud based systems and industrial control systems . At a high level ,ATT&CK It's a behavior model , It consists of the following core components :
• tactical , Indicates a short period during the attack 、 Tactical opponent target ;
• technology , Describe the opponent's means of achieving tactical goals ;
• Sub Technology , Describe a more specific means for an opponent to achieve tactical goals at a lower level than technology ;
• Record the technology used by the opponent , Their process , And other metadata .ATT&CK It is not an exhaustive list of attack vectors against software .
Detailed see MITRE Official documents , See My resources
ATT&CK matrix
The most famous is ATT&CK Matrix , The picture below is from Official website Intercepted . The above describes the process of each step of the red team attack .
Can't understand google Translate

ATT&CK It is mainly used for the following four use cases : Threat Intelligence 、 Detection and analysis 、 Opponent simulation and red team , as well as Evaluation and Engineering . Each use case has a different level of complexity .
The official website also gives tutorials of these four use cases :https://medium.com/mitre-attack/getting-started/home
ATT&CK The navigation bar :https://mitre-attack.github.io/attack-navigator/
You can select the characteristics of each process for analysis 
Use scenarios
(1) Confrontation simulation
ATT&CK It can be used to create confrontational simulation scenarios , Test and verify defense solutions for common countermeasures .
(2) The red team / Penetration testing activities
The red team 、 Planning of purple team and penetration test activities 、 Execution and reporting can use ATT&CK, So that there is a common language between the defender and the report receiver and within them .
(3) Develop a behavior analysis program
ATT&CK It can be used to build and test behavior analysis schemes , To detect confrontational behavior in the environment .
(4) Defense gap assessment
ATT&CK It can be used as a common confrontation model with behavior as the core , To evaluate the tools in the existing defense plan within the organization 、 Monitoring and mitigation measures . Research on MITRE ATT&CK when , Most security teams tend to work for Enterprise Each technology in the matrix attempts to develop some kind of detection or preventive control measures . Although this is not a bad idea , however ATT&CK The techniques in the matrix can usually be implemented in many ways . therefore , One method of preventing or detecting the execution of these technologies does not necessarily cover all possible methods of executing the technology . Because some tool prevents the adoption of this technology in another form , And the organization has adopted this technology appropriately , This may lead to a false sense of security . however , Attackers can still successfully adopt this technology in other ways , But the defender has no detection or preventive measures .
(5)SOC Maturity assessment
ATT&CK Can be used as a measure , determine SOC In detection 、 Effectiveness in analyzing and responding to intrusion .SOC The team can refer to ATT&CK Technologies and tactics detected or not covered . This helps to understand where defense strengths and weaknesses are , And verify mitigation and detection control measures , Configuration errors and other operation problems can be found .
(6) Cyber threat intelligence gathering
边栏推荐
- Ordinary practice of JS DOM programming
- Sword finger offer II 055. Binary search tree iterator (medium binary search tree iterator)
- Solve the problem that TS node xxx.ts executes TS code and reports errors
- 纪念一下第一次写的线段树了喽(对应洛谷3372)
- 【二叉树】二叉树中的伪回文路径
- Jmeter 安装第三方插件 Plugins Manager
- Sword finger offer II 057. the difference between the value and the subscript is within the given range (medium array bucket sort sliding window TreeSet)
- Closure, prototype and original link
- HCIP(14)
- 删除容器镜像报错解决image is referenced in multiple repositories
猜你喜欢

Hcip seventh experiment

How about the actual use effect of common source oscilloscope

JMeter installs third-party plug-ins plugins Manager

Less than a year after its establishment! MIT derivative quantum computing company completed financing of US $9million

网易云信 2022Q2 产品补给站,快来获取你的产品补给计划吧!

Hcip experiment (14)

HCIP(11)

SQL注入 Less42(POST型堆叠注入)

HCIP(12)

2022年一级建造师考试什么时候才能报名?
随机推荐
Jianzhi offer II 062. implement prefix tree (medium design dictionary tree prefix tree string)
容器化配置启动redis集群 单机6节点 3主3从
TensorFlow Serving 高性能的机器学习模型服务系统
98. Verify binary search tree (medium binary search tree DFS)
2021 mathematical modeling group B exercise
PaddleNLP基于ERNIR3.0文本分类:WOS数据集为例(层次分类)
Basic introduction of Rockwell AB PLC rslogix digital quantity IO module
Day3 classification management of Ruiji takeout project
ssh 免密码登录
105. Construct binary tree from preorder and inorder traversal sequence (medium binary tree DFS hash table binary tree)
vuejs中如何实现动态路由切换及路由的缓存
Is mov format a still image file format
Closure, prototype and original link
lotus 1.16.0 延长扇区过期时间
静态路由和缺省路由实验
75. Color classification (medium array double pointer sorting)
HCIP(8)
Changes in the history of oscilloscope development
HCIP(12)
What does GPRS network mean