14. Introduction to Threats, Attacks, and Exploits Exercise
Introduction to Threats, Attacks, and Exploits Exercise
A Threat Example
In this exercise, you will take a look at a specific threat.
Task Description:
In this exercise, you'll explore threat information found on the MITRE ATT&CKĀ® website.
Task Feedback:
Congratulations! Now use the information you have just reviewed to answer the questions below.
QUESTION:
For the attack you selected (either the Drive-by Compromise or one of your choosing) answer the following:
- Attack Name:
- ID:
- Tactic:
- Platform:
- Permissions Required:
- Brief description of the attack:
ANSWER:
See an explanation of the answers for the Drive-by Compromise:
- Attack Name: Drive-by Compromise
- ID: T1189
- Tactic: Initial Access
- Platform(s): Windows, Linux, macOS, SaaS
- Permissions Required: User
- Brief description of the attack: see the solution page