TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Black Hills InfoSec

In Through the Front Door – Protecting Your Perimeter

BHIS · 2024-03-28 · Read original ↗

ATT&CK techniques detected

5 predictions
T1654Log Enumeration
95%
"at a minimum, offload firewall logs to a syslog server. other instances where a client ’ s microsoft 365 tenant did not have audit logging enabled were also common. a lack of log data can make it very difficult, in some cases impossible, to fully answer critical questions about e…"
T1190Exploit Public-Facing Application
76%
"0 - days, continued exploitation took place well after patches were available from the vendors. what can we do to protect ourselves? let ’ s look at some questions we can ask to help ensure our external infrastructure is as secure as possible. what is accessible and why? knowing …"
T1654Log Enumeration
53%
"users are accessing network resources externally. where possible, keep the resources accessible only through a vpn that is protected with a strong password and multi - factor authentication. if a user requires external access to internal network services, it is a better choice to…"
T1190Exploit Public-Facing Application
39%
"these services were exploited? ” if a public - facing service is breached, where can the attacker move to next? will they be able to access your entire network from a single compromised host, or will they be in a network that restricts or delays immediate lateral movement? answer…"
T1190Exploit Public-Facing Application
32%
"in through the front door – protecting your perimeter in through the front door – protecting your perimeter terry is a seasoned penetration tester with a diverse background across it, cybersecurity, and military service. before joining black hills information security in 2022, he…"

Summary

While social engineering attacks such as phishing are a great way to gain a foothold in a target environment, direct attacks against externally exploitable services are continuing to make headlines. […]

The post In Through the Front Door – Protecting Your Perimeter   appeared first on Black Hills Information Security, Inc..