Module 1 Flashcards

(44 cards)

1
Q

According to Vest and Tubberville, red teaming is the process of using TTPs to emulate a real-world threat to measure the effectiveness of an organization’s _____, _____, and _____.

A

people, processes, and technologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the primary goal of a red team engagement?

A

To achieve a pre-agreed operational objective, demonstrating business risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In the TTP framework, what does ‘Tactics’ represent?

A

A tactic is the overall tactical goal or the reason for performing an action, such as privilege escalation or lateral movement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In the TTP framework, what does ‘Techniques’ describe?

A

A technique describes how an adversary will achieve a tactic, such as extracting credentials from LSASS memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In the TTP framework, what does ‘Procedures’ describe?

A

A procedure describes the exact step-by-step process of how a technique is performed, such as using Mimikatz to read LSASS memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the primary role of a blue team?

A

A blue team’s role is to defend an organization from attack by detecting and responding to incursions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What do blue teams heavily rely on to differentiate between malicious and non-malicious activity?

A

They rely heavily on log telemetry from assets like workstations, servers, and firewalls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Adversary _____ involves mimicking a specific, known threat actor using their established TTPs.

A

emulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which type of adversary engagement is narrow in scope and designed to enhance defenses against a specific threat?

A

Adversary emulation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Adversary _____ involves acting as a hypothetical threat, leveraging unknown or unique TTPs.

A

simulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which type of adversary engagement is broad in scope and designed to enhance defenses against a range of threats?

A

Adversary simulation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a common strategy organizations use that combines both emulation and simulation?

A

They use emulation to set a baseline capability, then use simulation to improve that capability against more advanced TTPs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the English translation of the Latin phrase “primum non nocere”?

A

“First, do no harm.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In the context of red teaming, what is the risk of performing harmful actions like disabling security controls?

A

Once in place, you cannot guarantee they won’t be abused by another party, increasing the client’s risk exposure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What should a red teamer do before performing any potentially harmful actions during an engagement?

A

They should ensure the actions are permitted and have the consent of the client, as documented in the rules of engagement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Term: OPSEC (Operations Security)

A

Definition: A measure of how likely a red team’s actions can be observed and subsequently interrupted by a blue team.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

OPSEC is a more significant concern during adversary simulation than emulation. Why?

A

In a simulation, the goal is to achieve the objective without getting caught, whereas emulation is constrained to specific, known TTPs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

According to Gartner, what is threat intelligence?

A

Evidence-based knowledge about a menace or hazard that can be used to inform decisions regarding response.

19
Q

What do the initials STIX stand for in the context of threat intelligence standards?

A

Structured Threat Information eXpression.

20
Q

What do the initials TAXII stand for in the context of threat intelligence standards?

A

Trusted Automated eXchange of Indicator Information.

21
Q

Who introduced the attack lifecycle framework known as the ‘Cyber Kill Chain’?

A

Lockheed Martin.

22
Q

What is the first phase of the Cyber Kill Chain?

A

Reconnaissance: scouting a target and finding potential attack vectors.

23
Q

What is the ‘Weaponisation’ phase of the Cyber Kill Chain?

A

Developing a malicious payload.

24
Q

In the Cyber Kill Chain, the ‘Exploitation’ phase refers to what action?

A

The initial attack of delivering the weaponized payload.

25
What is the 'Command & Control' phase of the Cyber Kill Chain?
Establishing a means of controlling compromised targets.
26
What is the final phase of the Cyber Kill Chain?
Actions on Objectives: achieving the operational goal, such as data theft.
27
What is the most significant shortcoming of the original Cyber Kill Chain framework?
It lacks detail on post-compromise activities, such as how an adversary moves within a network to achieve their objective.
28
Which vendor introduced the 'Targeted Attack Lifecycle'?
Mandiant.
29
In Mandiant's lifecycle, what is the 'Establish Foothold' phase?
Maintaining continued control over a compromised system by installing persistent backdoors.
30
In Mandiant's lifecycle, what is the objective of the 'Move Laterally' phase?
To use obtained credentials to compromise additional systems within the internal network.
31
What modern, widely-used framework serves as a knowledge base of adversary behavior and taxonomy reflecting attack lifecycle phases?
MITRE ATT&CK.
32
What document establishes the authorized targets, restrictions, and objectives for a red team engagement?
The Rules of Engagement (ROE).
33
What is one of the most important 'do's' for tradecraft, essential for reporting and deconfliction?
Log all actions taken during the engagement.
34
What is a key tradecraft 'do' regarding the use of tools and techniques?
Understand how a tool or technique interacts with a target, the changes it makes, and the artifacts it leaves behind.
35
After gaining access to a new system, a red teamer should always perform _____ _____ to understand the environment.
situational awareness
36
Why is it a 'don't' to use untested or pre-compiled public tools on an engagement?
To ensure the tool won't have a negative impact, crash a system, or contain backdoors.
37
What is a major tradecraft 'don't' regarding Command and Control (C2) traffic?
Do not use unencrypted channels for C2.
38
Why should red teams avoid using unencrypted C2 channels like netcat?
Plaintext data is easier for IDS/IPS to detect and it leaves credentials vulnerable to sniffing by third parties.
39
What is the recommended practice for a red team that gains access to sensitive datasets like PII or HIPAA?
Obtain proof of access but do not access or exfiltrate the data itself to avoid causing a data breach.
40
Why is disabling security controls like anti-virus considered a bad practice ('don't') for red teams?
It places unnecessary risk upon the client and weakens their security posture, violating the 'primum non nocere' principle.
41
In the TTP model, gaining access to credentials by extracting them from LSASS memory is an example of a _____.
Technique
42
In the TTP model, 'Credential Access' is an example of a _____.
Tactic
43
Using `sekurlsa::logonpasswords` in Mimikatz to dump credentials from memory is an example of a _____.
Procedure
44
Which attack lifecycle model is represented as having cyclical phases, such as a 'Low privileges Lateral movement cycle'?
The Microsoft-published model.