Module 6 Flashcards

(60 cards)

1
Q

What is the primary goal of the ‘Initial Access’ tactic [TA0001]?

A

To gain an initial foothold within a target network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Besides social engineering, what are two other techniques for gaining Initial Access?

A

Exploiting public-facing services and supply-chain compromise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the most prevalent technique used for Initial Access?

A

Social engineering attacks such as phishing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Mariusz Banach’s phishing taxonomy is represented as DELIVERY(CONTAINER(_____ + PAYLOAD + DECOY)).

A

TRIGGER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In the phishing taxonomy, what does the ‘Delivery’ component represent?

A

The technique used to deliver the package to the victim.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In the phishing taxonomy, what does the ‘Container’ component represent?

A

The container format used to package the files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In the phishing taxonomy, what does the ‘Trigger’ component represent?

A

The means to trigger payload execution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In the phishing taxonomy, what does the ‘Payload’ component represent?

A

The malicious code to be executed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In the phishing taxonomy, what does the ‘Decoy’ component represent?

A

A file displayed to the victim to maintain the social engineering pretext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In the Lumma Stealer campaign example, what file type was disguised as a PDF to trick victims?

A

A Windows shortcut (.lnk) file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The LNK files in the Lumma Stealer campaign were weaponized to download malicious content using what Windows utility?

A

mshta

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What should the file type of a decoy be if the trigger was disguised as a PDF?

A

The decoy should also be a PDF document to continue the pretext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is DLL hijacking?

A

A technique used to force a legitimate application into loading a malicious DLL by abusing the Windows DLL search order.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In the simplified Windows DLL search order, what is the first location an application checks for a DLL?

A

The directory the application is in.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What Process Monitor filter settings can be used to find DLL hijacking opportunities?

A

Set the path to end in ‘.dll’ and the result to be ‘NAME NOT FOUND’.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is DLL side-loading in the context of the Windows Component Store?

A

It is a form of DLL hijacking that leverages old, vulnerable application versions stored in C:\Windows\WinSxS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the original purpose of the Windows Component Store (WinSxS)?

A

To support side-by-side assemblies, allowing multiple versions of the same dependencies to exist on a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

In the ngentask.exe side-loading example, which DLL was it attempting to load from the current working directory?

A

mscorsvc.dll

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the purpose of using a custom AppDomainManager for .NET applications?

A

To force a .NET Framework application into loading a malicious DLL, regardless of the standard search order.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

To create a custom AppDomainManager, your class must inherit from what base class?

A

AppDomainManager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the two environment variables used to load a custom AppDomainManager into a .NET application?

A

APPDOMAIN_MANAGER_ASM and APPDOMAIN_MANAGER_TYPE.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Besides environment variables, how else can a custom AppDomainManager be loaded into a .NET application?

A

By specifying the ‘appDomainManagerAssembly’ and ‘appDomainManagerType’ elements in a .config file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What file extension is used for Windows Installer packages?

A

.msi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

In a Visual Studio Setup Project for an MSI, how do you make the payload execute during installation?

A

By adding the payload file as a Custom Action in the ‘Install’ step.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
When building an MSI project in Visual Studio, which of the two output files (.exe and .msi) is essential for delivery to a victim?
The .msi file, as the .exe is just a wrapper.
26
What is an .xlam file?
A macro-enabled Excel Add-In, designed to add custom functionality to Excel.
27
What is a primary challenge for using macros for initial access?
Protected View, which disables macros in files with Mark of the Web (MotW) or from untrusted locations.
28
Which user-writable directory in `%APPDATA%` will cause Excel to automatically load any workbooks or add-ins present within it?
The XLSTART directory (`%APPDATA%\Microsoft\Excel\XLSTART\`).
29
In the VBA editor for Excel, what subroutine name is used to have code execute automatically when an add-in is loaded?
Auto_Open()
30
What is the main benefit of using an EV (Extended Validation) code-signing certificate over a standard one?
An EV certificate makes the publisher identity trusted by SmartScreen, completely removing 'Unknown Publisher' warnings.
31
Why is it a bad idea for a red team to sign malware with their legitimate company's code-signing certificate?
It reveals their identity to the victim and the certificate will likely be revoked if the malware is publicly discovered.
32
What is a 'dropper' in the context of an initial access campaign?
A program whose purpose is to deliver another program, often to evade antivirus and complicate analysis.
33
Where do most droppers get the payload they are delivering?
By extracting embedded resources from within their own image or downloading them from a remote server.
34
In Visual Studio, what must the 'Build Action' property of a file be set to for it to be included as an embedded resource?
Embedded Resource.
35
In a C# dropper, which method from the `Assembly` class is used to read an embedded resource?
GetManifestResourceStream()
36
What must the name of an embedded resource be prefixed with when calling `GetManifestResourceStream`?
The project's namespace.
37
Of the standard system locations (`Program Files`, `ProgramData`, `Windows`), which is typically writable by a standard, non-administrative user?
C:\ProgramData\
38
What is the purpose of the GadgetToJScript (G2JS) tool?
To serialize a .NET assembly into a script file (like JavaScript) that can be executed by a native script host.
39
In the GadgetToJScript command, what does the `-w` switch specify?
The type of script to output (e.g., js, vbs, vba, hta).
40
In the GadgetToJScript command, what is the purpose of the `-b` switch?
It bypasses type check controls introduced in .NET Framework 4.8 and later.
41
A complex infection chain could look like: ISO => _____ => JS => .NET DLL => EXE.
LNK
42
What is the function of the `@echo off` directive in a Windows Batch file?
It prevents the commands themselves from being displayed in the command prompt as they are executed.
43
In a Batch script, how can you prevent a command's output from being displayed to the user?
By appending `> nul 2>&1` to the end of the command.
44
What anti-analysis trick for Batch files involves comparing the `%cmdcmdline%` and `%~f0` variables?
It checks if the script's own path is in the command line, exiting if it's not, which can defeat sandboxes that run scripts programmatically.
45
What special property of the .lnk file extension makes it deceptive in Windows Explorer?
The .lnk extension is not shown, even when 'show file name extensions' is enabled.
46
Which COM object is commonly used in PowerShell to create and modify .lnk (shortcut) files?
WScript.Shell
47
In a PowerShell script creating a .lnk file, which property sets the program to be executed?
$lnk.TargetPath
48
In a PowerShell script creating a .lnk file, which property sets the command-line arguments for the target program?
$lnk.Arguments
49
The 'GrimResource' technique uses a specially crafted .msc file to exploit an XSS flaw in which Windows executable?
Microsoft Management Console (mmc.exe).
50
What is a key advantage of the .msc 'GrimResource' technique regarding user privileges?
mmc.exe is an auto-elevating binary, so the payload may run with high integrity if the user is a local administrator and approves the UAC prompt.
51
What is Mark of the Web (MotW)?
A zone identifier used by Windows to mark files downloaded from the internet as potentially unsafe.
52
How can Mark of the Web (MotW) interfere with phishing payloads, especially Office documents?
It can cause Windows to show extra security warnings, and Office will not enable macros if MotW is present.
53
Why are container formats like ISO, IMG, and ZIP good choices for initial access packages?
They are natively supported by Windows and can prevent the propagation of Mark of the Web to the files inside.
54
What is the purpose of the `-H` parameter in the PackMyPayload tool?
To set the hidden attribute on specified files as they are packaged into a container.
55
What is HTML smuggling?
A technique that encodes a malicious file within the HTML/JavaScript of a webpage to bypass content filters.
56
How does HTML smuggling prevent network scanners from seeing the malicious file's content during download?
The file is decoded and assembled by JavaScript on the client side, so the network traffic only shows HTML/JavaScript, not the final binary file.
57
In the provided HTML smuggling example, what JavaScript function is used to convert the base64 string back into binary data?
window.atob()
58
What is SVG smuggling?
A technique similar to HTML smuggling that leverages the ability to embed executable JavaScript inside an SVG image file.
59
In Cobalt Strike, what feature is used to host a payload file on the internal web server?
Site Management > Host File.
60
In Cobalt Strike's site cloning feature, how is the payload download triggered when a victim visits the cloned page?
It embeds a hidden iframe in the page whose source URL points to the hosted payload file, causing an automatic download.