当前位置:网站首页>Att & CK preliminary understanding
Att & CK preliminary understanding
2022-07-28 22:30:00 【sec0nd_】
List of articles
ATT&CK background
MITRE It is a research institution funded by the U.S. government , The company is 1958 Years from MIT separate from , And participated in many commercial and top secret projects . It includes developing FAA Air traffic control system and AWACS Airborne radar system .MITRE At the National Institute of standards and Technology (NIST) Has engaged in a large number of network security practices under the support of .MITRE stay 2013 Introduced in the ATT&CK Model .
ATT&CK What is it?
MITRE ATT&CK It is a well planned knowledge base and model for the behavior of network opponents , It reflects the various stages of the opponent's attack life cycle and their known target platforms .ATT&CK Focus on how external rivals compromise and operate in Computer Information Networks .
It originated from a project , The project records and classifies the post invasion attacks against Microsoft Windows Opponent tactics of the system 、 Technology and procedures (TTPs), To improve the detection of malicious behavior . Later it developed to include Linux and macOS, And expand to cover behaviors that lead to environmental compromise , And key areas of Technology , Like mobile devices 、 Cloud based systems and industrial control systems . At a high level ,ATT&CK It's a behavior model , It consists of the following core components :
• tactical , Indicates a short period during the attack 、 Tactical opponent target ;
• technology , Describe the opponent's means of achieving tactical goals ;
• Sub Technology , Describe a more specific means for an opponent to achieve tactical goals at a lower level than technology ;
• Record the technology used by the opponent , Their process , And other metadata .ATT&CK It is not an exhaustive list of attack vectors against software .
Detailed see MITRE Official documents , See My resources
ATT&CK matrix
The most famous is ATT&CK Matrix , The picture below is from Official website Intercepted . The above describes the process of each step of the red team attack .
Can't understand google Translate

ATT&CK It is mainly used for the following four use cases : Threat Intelligence 、 Detection and analysis 、 Opponent simulation and red team , as well as Evaluation and Engineering . Each use case has a different level of complexity .
The official website also gives tutorials of these four use cases :https://medium.com/mitre-attack/getting-started/home
ATT&CK The navigation bar :https://mitre-attack.github.io/attack-navigator/
You can select the characteristics of each process for analysis 
Use scenarios
(1) Confrontation simulation
ATT&CK It can be used to create confrontational simulation scenarios , Test and verify defense solutions for common countermeasures .
(2) The red team / Penetration testing activities
The red team 、 Planning of purple team and penetration test activities 、 Execution and reporting can use ATT&CK, So that there is a common language between the defender and the report receiver and within them .
(3) Develop a behavior analysis program
ATT&CK It can be used to build and test behavior analysis schemes , To detect confrontational behavior in the environment .
(4) Defense gap assessment
ATT&CK It can be used as a common confrontation model with behavior as the core , To evaluate the tools in the existing defense plan within the organization 、 Monitoring and mitigation measures . Research on MITRE ATT&CK when , Most security teams tend to work for Enterprise Each technology in the matrix attempts to develop some kind of detection or preventive control measures . Although this is not a bad idea , however ATT&CK The techniques in the matrix can usually be implemented in many ways . therefore , One method of preventing or detecting the execution of these technologies does not necessarily cover all possible methods of executing the technology . Because some tool prevents the adoption of this technology in another form , And the organization has adopted this technology appropriately , This may lead to a false sense of security . however , Attackers can still successfully adopt this technology in other ways , But the defender has no detection or preventive measures .
(5)SOC Maturity assessment
ATT&CK Can be used as a measure , determine SOC In detection 、 Effectiveness in analyzing and responding to intrusion .SOC The team can refer to ATT&CK Technologies and tactics detected or not covered . This helps to understand where defense strengths and weaknesses are , And verify mitigation and detection control measures , Configuration errors and other operation problems can be found .
(6) Cyber threat intelligence gathering
边栏推荐
- Sword finger offer II 058. schedule (medium design segment tree treemap ordered set)
- Sword finger offer II 056. Sum of two nodes in a binary search tree (simple binary search tree DFS hash table double pointer iterator)
- HCIP(10)
- MySQL command (add, delete, check and modify)
- Static details of static members
- mysql8.0无法给用户授权或提示You are not allowed to create a user with GRANT的问题
- internet的基本服务中文件传输命令是哪个
- DOM programming + events
- Soft exam network engineer
- Hcip seventh experiment
猜你喜欢
随机推荐
20-09-27项目迁移到阿里折腾记录(网卡顺序导致服务无法通过haproxy连接到db)
示波器发展史中的变化
微信小程序使用canvas绘图,圆形头像,网络背景图,文字,虚线,直线
DHCP and PPPoE protocols and packet capture analysis
Changes in the history of oscilloscope development
Establishment of Ruiji takeout development environment
JS convert numbers to letters
Hcip seventh experiment
【CVPR 2021】Cylinder3D:用于LiDAR点云分割的圆柱体非对称3D卷积网络
ECMASript 5/6 笔记
Analysis notes on let (const) temporary dead zone in JS
MySQL command (add, delete, check and modify)
HCIP(15)
成立不到一年!MIT衍生量子计算公司完成900万美元融资
Excel-VBA 快速上手(十三、日期的常见用法)
纪念一下第一次写的线段树了喽(对应洛谷3372)
imx6q gpio复用
tutorial/detailed_workflow.ipynb 量化金融Qlib库
Solve the problem that TS node xxx.ts executes TS code and reports errors
IFLYTEK written examination








