-
Notifications
You must be signed in to change notification settings - Fork 3
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Update to graphics, pages, and video placeholders
- Loading branch information
1 parent
578909c
commit d517b19
Showing
51 changed files
with
454 additions
and
107 deletions.
There are no files selected for viewing
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Oops, something went wrong.
Oops, something went wrong.
Oops, something went wrong.
Oops, something went wrong.
Oops, something went wrong.
Oops, something went wrong.
Oops, something went wrong.
Large diffs are not rendered by default.
Oops, something went wrong.
Large diffs are not rendered by default.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,44 @@ | ||
Reconnaissance,,Resource Development,Initial Access,Execution,Persistence,Privilege Escalation,,Defense Evasion,Credential Access,,Discovery,Lateral Movement,Collection,Command and Control,Exfiltration,Impact | ||
Active Scanning,Scanning IP Blocks,Acquire Access,Content Injection,Cloud Administration Command,Account Manipulation,Abuse Elevation Control Mechanism,,Abuse Elevation Control Mechanism,Adversary-in-the-Middle,,Account Discovery,Exploitation of Remote Services,Adversary-in-the-Middle,Application Layer Protocol,Automated Exfiltration,Account Access Removal | ||
,Vulnerability Scanning,Acquire Infrastructure,Drive-by Compromise,Command and Scripting Interpreter,BITS Jobs,Access Token Manipulation,,Access Token Manipulation,Brute Force,Credential Stuffing,Application Window Discovery,Internal Spearphishing,Archive Collected Data,Communication Through Removable Media,Data Transfer Size Limits,Data Destruction | ||
,Wordlist Scanning,Compromise Accounts,Exploit Public-Facing Application,Container Administration Command,Boot or Logon Autostart Execution,Account Manipulation,Additional Cloud Credentials,BITS Jobs,,Password Cracking,Browser Information Discovery,Lateral Tool Transfer,Audio Capture,Content Injection,Exfiltration Over Alternative Protocol,Data Encrypted for Impact | ||
Gather Victim Host Information,,Compromise Infrastructure,External Remote Services,Deploy Container,Boot or Logon Initialization Scripts,,Additional Cloud Roles,Build Image on Host,,Password Guessing,Cloud Infrastructure Discovery,Remote Service Session Hijacking,Automated Collection,Data Encoding,Exfiltration Over C2 Channel,Data Manipulation | ||
Gather Victim Identity Information,,Develop Capabilities,Hardware Additions,Exploitation for Client Execution,Browser Extensions,,Additional Container Cluster Roles,Debugger Evasion,,Password Spraying,Cloud Service Dashboard,Remote Services,Browser Session Hijacking,Data Obfuscation,Exfiltration Over Other Network Medium,Defacement | ||
Gather Victim Network Information,DNS,Establish Accounts,Phishing,Inter-Process Communication,Compromise Host Software Binary,,Additional Email Delegate Permissions,Deobfuscate/Decode Files or Information,Credentials from Password Stores,,Cloud Service Discovery,Replication Through Removable Media,Clipboard Data,Dynamic Resolution,Exfiltration Over Physical Medium,Disk Wipe | ||
,Domain Properties,Obtain Capabilities,Replication Through Removable Media,Native API,Create Account,,Device Registration,Deploy Container,Exploitation for Credential Access,,Cloud Storage Object Discovery,Software Deployment Tools,Data from Cloud Storage,Encrypted Channel,Exfiltration Over Web Service,Endpoint Denial of Service | ||
,IP Addresses,Stage Capabilities,Supply Chain Compromise,Scheduled Task/Job,Create or Modify System Process,,SSH Authorized Keys,Direct Volume Access,Forced Authentication,,Container and Resource Discovery,Taint Shared Content,Data from Configuration Repository,Fallback Channels,Scheduled Transfer,Financial Theft | ||
,Network Security Appliances,,Trusted Relationship,Serverless Execution,Event Triggered Execution,Boot or Logon Autostart Execution,,Domain or Tenant Policy Modification,Forge Web Credentials,,Debugger Evasion,Use Alternate Authentication Material,Data from Information Repositories,Hide Infrastructure,Transfer Data to Cloud Account,Firmware Corruption | ||
,Network Topology,,Valid Accounts,Shared Modules,External Remote Services,Boot or Logon Initialization Scripts,,Execution Guardrails,Input Capture,,Device Driver Discovery,,Data from Local System,Ingress Tool Transfer,,Inhibit System Recovery | ||
,Network Trust Dependencies,,,Software Deployment Tools,Hijack Execution Flow,Create or Modify System Process,,Exploitation for Defense Evasion,Modify Authentication Process,,Domain Trust Discovery,,Data from Network Shared Drive,Multi-Stage Channels,,Network Denial of Service | ||
Gather Victim Org Information,Business Relationships,,,System Services,Implant Internal Image,Domain or Tenant Policy Modification,,File and Directory Permissions Modification,Multi-Factor Authentication Interception,,File and Directory Discovery,,Data from Removable Media,Non-Application Layer Protocol,,Resource Hijacking | ||
,Determine Physical Locations,,,User Execution,Modify Authentication Process,Escape to Host,,Hide Artifacts,Multi-Factor Authentication Request Generation,,Group Policy Discovery,,Data Staged,Non-Standard Port,,Service Stop | ||
,Identify Business Tempo,,,Windows Management Instrumentation,Office Application Startup,Event Triggered Execution,,Hijack Execution Flow,Network Sniffing,,Log Enumeration,,Email Collection,Protocol Tunneling,,System Shutdown/Reboot | ||
,Identify Roles,,,,Power Settings,Exploitation for Privilege Escalation,,Impair Defenses,OS Credential Dumping,,Network Service Discovery,,Input Capture,Proxy,, | ||
Phishing for Information,,,,,Pre-OS Boot,Hijack Execution Flow,,Impersonation,Steal Application Access Token,,Network Share Discovery,,Screen Capture,Remote Access Software,, | ||
Search Closed Sources,,,,,Scheduled Task/Job,Process Injection,,Indicator Removal,Steal or Forge Authentication Certificates,,Network Sniffing,,Video Capture,Traffic Signaling,, | ||
Search Open Technical Databases,,,,,Server Software Component,Scheduled Task/Job,,Indirect Command Execution,Steal or Forge Kerberos Tickets,,Password Policy Discovery,,,Web Service,, | ||
Search Open Websites/Domains,,,,,Traffic Signaling,Valid Accounts,,Masquerading,Steal Web Session Cookie,,Peripheral Device Discovery,,,,, | ||
Search Victim-Owned Websites,,,,,Valid Accounts,,,Modify Authentication Process,Unsecured Credentials,Bash History,Permission Groups Discovery,,,,, | ||
,,,,,,,,Modify Cloud Compute Infrastructure,,Chat Messages,Process Discovery,,,,, | ||
,,,,,,,,Modify Registry,,Cloud Instance Metadata API,Query Registry,,,,, | ||
,,,,,,,,Modify System Image,,Container API,Remote System Discovery,,,,, | ||
,,,,,,,,Network Boundary Bridging,,Credentials In Files,Software Discovery,,,,, | ||
,,,,,,,,Obfuscated Files or Information,,Credentials in Registry,System Information Discovery,,,,, | ||
,,,,,,,,Plist File Modification,,Group Policy Preferences,System Location Discovery,,,,, | ||
,,,,,,,,Pre-OS Boot,,Private Keys,System Network Configuration Discovery,,,,, | ||
,,,,,,,,Process Injection,,,System Network Connections Discovery,,,,, | ||
,,,,,,,,Reflective Code Loading,,,System Owner/User Discovery,,,,, | ||
,,,,,,,,Rogue Domain Controller,,,System Service Discovery,,,,, | ||
,,,,,,,,Rootkit,,,System Time Discovery,,,,, | ||
,,,,,,,,Subvert Trust Controls,,,Virtualization/Sandbox Evasion,,,,, | ||
,,,,,,,,System Binary Proxy Execution,,,,,,,, | ||
,,,,,,,,System Script Proxy Execution,,,,,,,, | ||
,,,,,,,,Template Injection,,,,,,,, | ||
,,,,,,,,Traffic Signaling,,,,,,,, | ||
,,,,,,,,Trusted Developer Utilities Proxy Execution,,,,,,,, | ||
,,,,,,,,Unused/Unsupported Cloud Regions,,,,,,,, | ||
,,,,,,,,Use Alternate Authentication Material,,,,,,,, | ||
,,,,,,,,Valid Accounts,,,,,,,, | ||
,,,,,,,,Virtualization/Sandbox Evasion,,,,,,,, | ||
,,,,,,,,Weaken Encryption,,,,,,,, | ||
,,,,,,,,XSL Script Processing,,,,,,,, |
Binary file not shown.
Large diffs are not rendered by default.
Oops, something went wrong.
Oops, something went wrong.
Oops, something went wrong.
Oops, something went wrong.
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,33 @@ | ||
Cheat Sheet | ||
========== | ||
.. note:: | ||
This cheat sheet can be used to save time throughout the threat modeling process outlined, but is it important to understand the full process prior to choosing this version. Please review Questions 1 through 4 before choosing this route. | ||
|
||
What are we working on? | ||
----------------------- | ||
|
||
* Develop a top level DFD for your system | ||
* Identify critical components | ||
|
||
What could go wrong? | ||
-------------------- | ||
|
||
* Analyze your DFD using a simple attack tree or STRIDE | ||
* Brainstorm ATT&CK TTPs that could be used to attack the critical components within your DFD | ||
|
||
* Gather ideas from TTPs used against your tech platform previously- see ATT&CK matrix and down select by platform | ||
* Quick search through existing security stack for ability to defend against these brainstormed TTPs | ||
|
||
What are we going to do about it? | ||
--------------------------------- | ||
|
||
* Implement the mitigations listed within the ATT&CK page for each TTP | ||
|
||
**OR** | ||
|
||
* Implement the NIST 800-53 controls for each TTP using the MITRE Engenuity Mappings Explorer | ||
|
||
Did we do a good job? | ||
--------------------- | ||
|
||
* Periodically repeat this process to evaluate your existing mitigations and make sure they are in sync with the development of your system. |
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.