Interview Questionafff
Interview Questionafff
A1: Injection.
A2: Cross-Site Scripting (XSS)
A3: Broken Authentication and Session Management.
A4: Insecure Direct Object References.
A5: Cross-Site Request Forgery (CSRF)
A6: Security Misconfiguration.
A7: Insecure Cryptographic Storage.
Attack Mitre
Initial Access: Spearphishing Attachment, Exploit Public-Facing Application
Execution: Dynamic Data Exchange, PowerShell
Persistence: Registry Run Keys / Startup Folder
Privilege Escalation: Bypass User Account Control
Defense Evasion: Clear Command History, Disabling Security Tools
Credential Access: Credential Dumping
Discovery: File and Directory Discovery, Account Discovery, Network Share
Discovery
Lateral Movement: Exploitation of Remote Services, Remote Desktop Protocol
Collection: Clipboard Data, Data from Network Shared Drive
Exfiltration: Data Compressed, Exfiltration Over Alternative Protocol
Command and Control: Connection Proxy, Data Obfuscation
APTs
Finance & Sales & government
Stone Panda
Tools:
Power Shell:
Credential Dumping:
Remote Desktop Protocol
Poison Ivy
Mimikatz
Hidden Cobra
Fancy bear
Telecomm
Reaper: Connection Proxy, Footprint deletion, Timestomping Credential Dumping,
Strategic Web Compromise
Chemical
TICK: Spear-Phishing attack, Strategic Web Compromise
IoCs
emergingthreats
Cisco Talos
Bad IPS
Blocklist.de
Platform:
Tokio 2020
Data can be leaked
POS system can be infected
Ransomware attack
Malware Analysis
Proc dump is used to create crash dump
Created fdf.dmp and stored in temp folder and runs lsass.exe (Local Security Authority
Subsystem Service) process
And runs Mimikatz on it
psapi.dll is a Process Status Helper file used by Windows to collate information and
files about all software and drivers on victim’s PC. It basically shows all the programs
that are running on the computer, allowing “Task Manager”
The DLL winhttp.dll is a genuine Microsoft process but attackers can also create fake
winhttp processes. This module is associated with Windows HTTP Services. The
module is designed to be used in server based scenario by server based applications
that communicate with HTTP servers
Interview preparation
Mimikatz incident
Local Security Authority Subsystem Service
Rootkit incident