15. Introduction to Threats, Attacks, and Exploits Solution

Introduction to Threats, Attacks, and Exploits Solution

ND545 C1 L3 14 Deep Dive Into Threats, Attacks,And Exploits Exercise Solution Video

Exercise Summary

The intent of this exercise is to give you an opportunity to learn specific information about different types of threats.

See an explanation of the answers for the Drive-by Compromise:

  • Attack Name: Drive-by Compromise
    • The specific name for the attack
  • ID: T1189
    • The attack's unique identifying number
  • Tactic: Initial Access
    • Where this type of attack typically occurs. This type of attack is used to gain the initial access into a system.
  • Platform(s): Windows, Linux, macOS, SaaS
    • Operating systems or platforms affecting this attack.
  • Permissions Required: User
    • Type of authorization required for the attack. In this case, a general user can accomplish it.
  • Brief description of the attack: "A drive-by compromise is when an adversary gains access to a system through a user visiting a website over the normal course of browsing. With this technique, the user's web browser is typically targeted for exploitation, but adversaries may also use compromised websites for non-exploitation behavior such as acquiring application access tokens."