TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Black Hills InfoSec

Check Your Perimeter

BHIS · 2020-03-23 · Read original ↗

ATT&CK techniques detected

6 predictions
T1572Protocol Tunneling
74%
"vpn tunnel. to avoid this situation, the vpn device can be configured to accept only main mode handshakes. a main mode handshake does not disclose the same details that can be used to recover the psk. in reality, this can be a difficult condition to exploit because the attacker t…"
T1190Exploit Public-Facing Application
72%
"and no credentials to exploit. to make matters worse, the exposed devices are typically missing security controls that are deployed to all of our workstations ( like antivirus and endpoint threat detection ). in addition, increased utilization is likely to make detection using lo…"
T1557.001Name Resolution Poisoning and SMB Relay
66%
"order to execute an evil twin attack. in the evil twin attack, the attacker advertises an identical ssid in hopes to entice devices to connect to it. when those devices use active directory domain authentication, the attacker ap challenges for credentials and the computer sends t…"
T1572Protocol Tunneling
44%
"etc ). allowing split - tunneling can make the investigation of an intrusion more difficult, if not impossible. now responders must consider traffic that is not traversing the corporate network and are likely to have reduced visibility on the employee ’ s network. organizations s…"
T1133External Remote Services
38%
"vpn tunnel. to avoid this situation, the vpn device can be configured to accept only main mode handshakes. a main mode handshake does not disclose the same details that can be used to recover the psk. in reality, this can be a difficult condition to exploit because the attacker t…"
T1557.003DHCP Spoofing
37%
"order to execute an evil twin attack. in the evil twin attack, the attacker advertises an identical ssid in hopes to entice devices to connect to it. when those devices use active directory domain authentication, the attacker ap challenges for credentials and the computer sends t…"

Summary

David Fletcher // With so many organizations transitioning to remote work in order to stem the tide of COVID-19 infections, we wanted to cover some of the configuration elements you […]

The post Check Your Perimeter appeared first on Black Hills Information Security, Inc..