Tactics and Techniques Used

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/28

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

29 Terms

1
New cards

Spear Phishing

Malicious actor gathres info about their target to tailor the email and make it convincing

Uses OSINT sources

Can use typosquatting or sender spoofing to seem legitimate

2
New cards

Impersonation

Pretending to be somebody else (friend, colleague, authority figure)

3
New cards

Typosquatting

Impersonating a brand or domain by misspelling it

e.g. amazonn

4
New cards

Homoglyph

Difficult to spot

Characters that look virtually the same e.g. cyrillic and latin o

5
New cards

Sender Spoofing

Making the sending email address look the same as the legitimate (set by SMTP server)

6
New cards

How to detect sender spoofing

Perform IP lookup

Check reply-to address to see where it would be sent (and block it)

7
New cards

HTML styling

Phishing emails will replicate company html styling in emails to appear legit

Can look at the code behind it (decode if in base64) to look for phishing clues like credential harvesting

8
New cards

Three categories of malicious attachment

Non malicious files used for social engineering e.g. invoices

Non malicious files with malicious hyperlinks

Malicious files e.g. with scripts, macros

9
New cards

How to check a hyperlink’s safety

Hover over the link to see the real address

Open email in text editor and find url in anchor tags (on a VM or “dirty” system only

10
New cards

URL shortners

Services like bitly and short URL generate short versions that redirect to full URL

11
New cards

How to analyse shortened URLs for safety

Wannabrowser or URL2PNG to see the true page/info

12
New cards

File Hosting

Hosting malicious files on public believable services like google drive, one drive, dropbox (usually macros or links since those services have controls)

13
New cards

Business Email Compromise (BEC)

Attack on a business but focusing on those likely to transfer money or make purchases e.g. between vendors

14
New cards

Email compromise & vendor attack

Legit employee compromised, sends invoice emails to vendors

15
New cards

Email spoofing & alternative payment attack

employee account compromised, sends alternative payment method for future legit payments to vendors

16
New cards

Email spoofing & CEO fraud

Malicious actor poses as executive board member e.g. CEO, CFO, CTO

Contacts finance dept to transfer them money urgently

17
New cards

Email spoofing & data theft

Spoof an employee

Request to see information held about themselves

Spear phish using this info, or sell to hackers

18
New cards

Email compromise & zombie phishing

compromise email account

send malicious link to old email threads as it looks like its from the legit person

19
New cards

MD5

Message Digest 5

20
New cards

SHA

Secure Hash Algorithm

21
New cards

How to get file hashes using powershell

get-filehash (specify with -algorithm sha1 etc)

22
New cards

How to get file hashes with linux CLI

sha1sum <file> (or md5, sha256)

23
New cards

PhishTool

Forensic analysis console for phishing emails (and can retrieve artifacts too)

24
New cards

URL2PNG

Enter URL and it shows what the webpage looks like

25
New cards

URL2Scan

Shows a summary and screenshot of the URL

26
New cards

VirusTotal

Insert URL or file to check if vendors recognise it as malicious

27
New cards

Threat feeds

Provide security teams with phishing attacks and malicious artifact infoUR

28
New cards

URLhaus database

Collection of maliicous URLs by researchers

29
New cards

PhishTank

Malicious URL database by users