MITRE ATT&CK®

Infiltrating the network

MITRE ATT&CK - Infiltrating the network

Please tell us a little about yourself:

MITRE ATT&CK - Infiltrating the network
Huntsman

This is the second instalment in our analysis of an attack, and follows on from “MITRE ATT&CK® - Compromising the perimeter”. We previously looked at stages 1 to 3 of an attack, showing how a system was compromised and a persistent presence established on it.

Now we will look at the next five stages (4 to 8) and see how an attacker explores the network, discovering and compromising other systems and accounts.

GET THE PDF NOW

In this ‘Infiltration’ edition’...

we’ll walk you through a scenario demonstrating the attack stages, and show you the MITRE ATT&CK framework in action, covering:

# Privilege Escalation – methods used to exploit weaknesses in application controls and software.

# Defence Evasion – how attackers stay undetected.

# Credential Access – how attackers seek out users with higher privileges, to gain wider access to your data.

# Discovery – the reconnaissance of your network, data, remote systems and services, to determine the next steps & targets in an attack.

# Lateral Movement – techniques used to move around the network and gain control of different systems.

Please tell us a little about yourself:

MITRE ATT&CK - Infiltrating the network
DOWNLOAD THE PDF