From the course: Complete Guide to Penetration Testing
Unlock the full course today
Join today to access over 24,700 courses taught by industry experts.
The MITRE ATT&CK repository
From the course: Complete Guide to Penetration Testing
The MITRE ATT&CK repository
- [Presenter] It's useful to know the kind of techniques that attackers can use in their malware when preparing our defenses. Mitre provides a repository of tactics and techniques that have been found in malware accessible through their attack site. Building on the Lockheed Martin Cyber Kill Chain. The Mitre repository looks at the full attack from reconnaissance to impact and takes a deeper dive into what tactics and techniques are used to infiltrate the malware and the malware when it executes on its targets. Selecting matrices, we can see the list of techniques by the 12 stages of an attack. Let's select external remote services and we can see an explanation of the form of initial access, examples of various actors and how they achieve this. And scrolling down, we can see the mitigations ways to detect the technique and relevant references. Selecting tactics enterprise, we can see for the various tactics in the left hand list, the kind of techniques by attackers. If we select…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.