TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Black Hills InfoSec

At Home Detection Engineering Lab for Beginners

BHIS · 2024-05-02 · Read original ↗

ATT&CK techniques detected

3 predictions
T1059.001PowerShell
100%
"context ", " nonpublic, instance " ). getvalue ( $ executioncontext ) ). gettype ( ). getfield ( " _ authorizationmanager ", " nonpublic, instance " ). setvalue ( $ ctx, ( new - object system. management. automation. authorizationmanager " microsoft. powershell " ) ) } disable - …"
T1059.001PowerShell
98%
"framework : in order to complete a detection lab, we need a framework to reference cyber attacks to our specific environment. in this case, we will be using the mitre att & ck framework. the mitre att & ck framework is a knowledge base of adversary techniques and tactics that are…"
T1204.002Malicious File
46%
"##zuh - agent / index. html - https : / / github. com / redcanaryco / invoke - atomicredteam / wiki - https : / / github. com / redcanaryco / invoke - atomicredteam / wiki / execute - atomic - tests - ( local ) - https : / / attack. mitre. org / ready to learn more? level up your…"

Summary

| Niccolo Arboleda | Guest Author Niccolo Arboleda is a cybersecurity enthusiast and student at the University of Toronto. He is usually found in his home lab studying different cybersecurity […]

The post At Home Detection Engineering Lab for Beginners appeared first on Black Hills Information Security, Inc..