From the course: Ethical Hacking: The Complete Malware Analysis Process
Unlock the full course today
Join today to access over 22,400 courses taught by industry experts or purchase this course individually.
The MITRE ATT&CK repository
From the course: Ethical Hacking: The Complete Malware Analysis Process
The MITRE ATT&CK repository
- [Instructor] When diagnosing cyber attacks and analyzing malware, it's useful to know the kind of techniques that attackers can use. MITRE provides a repository of tactics and techniques that have been found in malware, accessible through their ATT&CK site. Whereas the Lockheed Martin Cyber Kill Chain looks at the full attack from reconnaissance to impact, the MITRE ATT&CK framework takes a deeper dive into what tactics and techniques are used to infiltrate the malware and when the malware executes on its target. Selecting Matrices, we can see the lists of techniques by the 12 stages of an attack. Let's select External Remote Services and we can see an explanation of the form of initial access and examples of various actors and how they can achieve this. Scrolling, we can see mitigations, ways to detect the technique, and relevant references. Selecting Tactics and then PRE-ATT&CK, we can see a list of 15 tactics used by attackers to prepare for their attack. Selecting Techniques…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
Types of malware3m 36s
-
The evolution of malware3m 40s
-
How malware is delivered2m 35s
-
How malware works3m 15s
-
How malware achieves persistence5m
-
Digging into rootkits4m 20s
-
Automating malware with botnets3m 57s
-
Virus construction kits5m 54s
-
Contemporary malware construction2m 47s
-
The MITRE ATT&CK repository2m
-
-
-
-
-