14. Introduction to Threats, Attacks, and Exploits Exercise

Introduction to Threats, Attacks, and Exploits Exercise

A Threat Example

In this exercise, you will take a look at a specific threat.

Task Description:

In this exercise, you'll explore threat information found on the MITRE ATT&CKĀ® website.

Task List:

Task Feedback:

Congratulations! Now use the information you have just reviewed to answer the questions below.

QUESTION:

For the attack you selected (either the Drive-by Compromise or one of your choosing) answer the following:

  • Attack Name:
  • ID:
  • Tactic:
  • Platform:
  • Permissions Required:
  • Brief description of the attack:
ANSWER:

See an explanation of the answers for the Drive-by Compromise:

  • Attack Name: Drive-by Compromise
  • ID: T1189
  • Tactic: Initial Access
  • Platform(s): Windows, Linux, macOS, SaaS
  • Permissions Required: User
  • Brief description of the attack: see the solution page