meta_pixel
Tapesearch Logo
Log in
Malicious Life

MITRE Attack Flow [ML B-Sides]

Malicious Life

Malicious Life

Technology

4.81K Ratings

🗓️ 24 April 2022

⏱️ 34 minutes

🧾️ Download transcript

Summary

MITRE Attack Flow [ML B-Sides]



Advertising Inquiries: https://redcircle.com/brands

Transcript

Click on a timestamp to play from that location

0:00.0

Defenders thinking lists, whereas attackers think in graphs, and as long as that's true, we're letting

0:08.9

attackers win. Hi and welcome to Sabirism's malicious life besides I'm Ran Levy. Innovation is naturally a fundamental part of cybersecurity.

0:27.0

It is what allows defenders to keep up with the ever shifting landscape of threats and techniques employed by attackers.

0:39.0

But not all innovation has to be necessarily technological in nature.

0:44.6

Sometimes, even relatively small changes to the way we view and analyze existing information

0:50.9

can be helpful in better utilizing our present technology.

0:55.7

The MITER Attack Flow Project aims to do exactly that.

1:00.2

It is essentially a new way to visualize, analyze and share knowledge about sequences of adversary behavior.

1:08.0

Visually, it's a flow chart.

1:10.0

It shows actions such as resource hijacking and deploying containers,

1:14.9

assets like AWS credentials or compute resources and arrows depicting the

1:20.9

flow of known attacks using these actions and assets.

1:26.1

For example, say that we have analyzed an intrusion that resulted in the exhalteration of data

1:31.9

from an organization.

1:33.6

Our Miter attack flow chart will look something like this.

1:37.5

At the very top, a blue rectangle representing the asset used by the attackers to infiltrate the network,

1:44.8

say an exposed Kubernetis dashboard.

1:48.0

From that blue rectangle, an arrow will point to a red rectangle representing an action, in this case using an external

1:56.8

remote service such as a VPN to infiltrate the organization's internal network.

2:03.0

What this flow chart shows us then is a certain attack flow,

2:07.0

from an exposed dashboard to an external remote service.

2:12.0

Of course, there are many such potential

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from Malicious Life, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of Malicious Life and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.