From the course: Penetration Testing Essential Training
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
The MITRE ATT&CK repository - Linux Tutorial
From the course: Penetration Testing Essential Training
The MITRE ATT&CK repository
- [Instructor] It's useful to know the kind of techniques that attackers can use in their malware when preparing our defenses. Mitre provides a repository of tactics and techniques that have been found in malware accessible through their attack site. Building on the Lockheed Martin cyber kill chain, the Mitre repository looks at the full attack from reconnaissance to impact, and takes a deeper dive into what tactics and techniques are used to infiltrate the malware, and the malware when it executes on its targets. Selecting matrices, we can see the list of techniques by the 12 stages of an attack. Let's select external remote services. And we can see an explanation of the form of initial access. Examples of various actors and how they achieve this. And scrolling down, we can see the mitigations, ways to detect the technique, and relevant references. Selecting tactics, enterprise, we can see for the various tactics in the left hand list, the kind of techniques by attackers. If we…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.