Module 5 Flashcards

(50 cards)

1
Q

What is the primary goal of the ‘Persistence’ tactic [TA0003] in a cyber attack?

A

To maintain access to a compromised system across reboots and other interruptions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Adversaries use persistence because they may not be able to reliably regain a foothold via their _____.

A

initial access technique

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The persistence technique involving ‘Registry Run Keys & Startup Folder’ is identified by which MITRE ATT&CK ID?

A

T1547.001

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The persistence technique involving ‘Logon Scripts’ is identified by which MITRE ATT&CK ID?

A

T1037.001

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The persistence technique involving the ‘PowerShell Profile’ is identified by which MITRE ATT&CK ID?

A

T1546.013

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The persistence technique involving ‘Scheduled Tasks’ is identified by which MITRE ATT&CK ID?

A

T1053.005

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The persistence technique involving ‘Component Object Model Hijacking’ is identified by which MITRE ATT&CK ID?

A

T1546.015

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The collection of techniques where an adversary configures a computer to automatically execute a payload during startup or logon is known as _____.

A

Boot or Logon Autostart Execution [T1547]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which Windows Registry key allows a program to run every time a user logs in and remains after execution?

A

HKCU\Software\Microsoft\Windows\CurrentVersion\Run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which Windows Registry key allows a program to run once when a user logs in and is then automatically deleted?

A

HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the syntax of the reg_set command used to create a registry value?

A

reg_set <host:optional> <hive> <key> <value> <type> <data></data></type></value></key></hive></host:optional>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In the example reg_set HKCU ... Updater REG_EXPAND_SZ ..., what does ‘Updater’ represent?

A

The name of the new registry value being created.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which command is used to read back a registry key’s value to confirm it was set correctly?

A

reg_query

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which command is used to remove a registry key or value when it’s no longer required?

A

reg_delete

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the full path to the user’s Startup folder, which can be used for persistence?

A

%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does an adversary establish persistence using the Startup folder?

A

By uploading or placing an executable file into the directory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which registry key contains a user’s environment variables and can be abused for logon script persistence?

A

HKCU\Environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

An adversary can set the _____ value in the HKCU\Environment key to point to a program that will execute on logon.

A

UserInitMprLogonScript

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the name of the PowerShell script that executes when new PowerShell windows are opened by a user?

A

profile.ps1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a legitimate use for a PowerShell profile?

A

To customize the appearance and behavior of PowerShell sessions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the example path given for a user’s PowerShell profile?

A

$HOME\Documents\WindowsPowerShell\Profile.ps1

22
Q

Why is it important for an adversary to avoid putting blocking code directly into a PowerShell profile?

A

Because the user will not be presented with an input prompt until the profile script has finished executing.

23
Q

Which PowerShell cmdlet can be used as a workaround to execute a payload from a profile without blocking the user’s prompt?

24
Q

What is a common trigger for a legitimate scheduled task?

A

A specific time, computer idle, system start, user logon, or a system event.

25
In what format are Windows scheduled tasks defined at their core?
XML
26
Which BOF command can create a scheduled task from a given XML task definition?
schtaskscreate
27
In a task's XML definition, what does the `` element specify?
It specifies that the task should run when a user logs on.
28
In a task's XML definition, what does the `` element inside `` specify?
It specifies the command or program to be executed by the task.
29
When using the `schtaskscreate` command, the task name provided must start with what character?
A backslash (\).
30
What command is used to delete a scheduled task created for persistence?
schtasksdelete
31
What is the primary purpose of the Component Object Model (COM) standard?
To provide an interoperability standard so applications in different languages can reuse the same software libraries.
32
In COM nomenclature, what is a 'component' or 'COM object'?
An interface and its associated implementation (the actual working code).
33
What is a CLSID in the context of COM?
A unique identifier (a GUID) used to track every COM object in the registry.
34
The `InProcServer32` key under a CLSID entry points to the path of a _____ that provides the COM functionality.
DLL
35
The `LocalServer32` key under a CLSID entry points to the path of an _____ that provides the COM functionality.
EXE
36
What is the core concept of COM hijacking?
An adversary changes or leverages a COM entry to trick an application into loading their malicious code instead of the intended object.
37
For standard user processes, which registry hive's COM entries take priority: HKLM or HKCU?
HKCU (HKEY_CURRENT_USER)
38
What is one common way a COM reference can be hijacked by a standard user?
By creating an entry in the HKCU hive for a CLSID that is only defined in the HKLM hive.
39
What is another opportunity for COM hijacking related to file paths?
When a COM entry points to a DLL or EXE that doesn't exist on disk, and the location is writable by standard users.
40
What Sysinternals tool is excellent for finding COM hijacking opportunities by displaying real-time registry access?
Process Monitor (procmon)
41
In `procmon`, what 'Operation' should be filtered for to find COM hijacking opportunities?
RegOpenKey
42
In `procmon`, what 'Result' should be filtered for to find processes trying to load non-existent COM objects?
NAME NOT FOUND
43
In `procmon`, the 'Path' filter should contain what two key names when searching for COM hijacks?
InprocServer32 or LocalServer32
44
Why would an adversary export `procmon` results and perform frequency analysis?
To find a COM object that is loaded a modest number of times, avoiding system instability.
45
In the provided COM hijacking example, which process loads the targeted COM object?
DllHost.exe
46
What PowerShell command is used to create a new registry key?
New-Item
47
What PowerShell command is used to set a property (like 'ThreadingModel') on an existing registry key?
New-ItemProperty
48
In the COM hijacking example, what user action triggers DllHost.exe to load the hijacked COM object?
Logging out and then logging back in.
49
A COM entry in `HKEY_CLASSES_ROOT` is a merged view of entries from `HKEY_LOCAL_MACHINE\Software\Classes` and _____.
HKEY_CURRENT_USER\Software\Classes
50
What are the two most important criteria for an adversary when selecting a COM object to hijack?
It shouldn't break software and shouldn't be loaded so frequently that it makes the system inoperable.