MITRE ATT&CK®

Compromising the perimeter

MITRE ATT&CK - Compromising the perimeter

Please tell us a little about yourself:

MITRE ATT&CK - Compromising the perimeter
Huntsman

Following on from the introductory “MITRE ATT&CK® - An Attacker’s Playbook”, we will now look at how MITRE ATT&CK® can be used to improve security monitoring and activities to prevent a compromise occurring.

We will see how an attack can be mapped to the Techniques and Tactics within the MITRE ATT&CK® Framework; and how this then leads to improvements in detection and mitigation processes.

GET THE PDF NOW

Key elements covered in our scenario-building / attack simulation:

# Attack Stage 1: Initial Access – an example of initial entry and two of the techniques used.

# Attack Stage 2: Execution – once initial access has been achieved, a look at how an attack will start to broaden, via the Execution Tactic.

# Attack Stage 3: Persistence - two Techniques that are used to establish connectivity for ongoing access to a Command & Control server.

# Detect & Defend – Mitigations that MITRE ATT&CK® provides, for the individual Techniques used in the stages of our attack scenario.

Please tell us a little about yourself:

MITRE ATT&CK - Compromising the perimeter
DOWNLOAD THE PDF