From the course: Ethical Hacking: The Complete Malware Analysis Process

Unlock the full course today

Join today to access over 22,400 courses taught by industry experts or purchase this course individually.

The MITRE ATT&CK repository

The MITRE ATT&CK repository

From the course: Ethical Hacking: The Complete Malware Analysis Process

Start my 1-month free trial

The MITRE ATT&CK repository

- [Instructor] When diagnosing cyber attacks and analyzing malware, it's useful to know the kind of techniques that attackers can use. MITRE provides a repository of tactics and techniques that have been found in malware, accessible through their ATT&CK site. Whereas the Lockheed Martin Cyber Kill Chain looks at the full attack from reconnaissance to impact, the MITRE ATT&CK framework takes a deeper dive into what tactics and techniques are used to infiltrate the malware and when the malware executes on its target. Selecting Matrices, we can see the lists of techniques by the 12 stages of an attack. Let's select External Remote Services and we can see an explanation of the form of initial access and examples of various actors and how they can achieve this. Scrolling, we can see mitigations, ways to detect the technique, and relevant references. Selecting Tactics and then PRE-ATT&CK, we can see a list of 15 tactics used by attackers to prepare for their attack. Selecting Techniques…

Contents