{"id":522,"date":"2024-12-24T13:01:07","date_gmt":"2024-12-24T13:01:07","guid":{"rendered":"https:\/\/ictmatrix.com\/?page_id=522"},"modified":"2024-12-24T13:04:03","modified_gmt":"2024-12-24T13:04:03","slug":"mitre-attck-evaluations","status":"publish","type":"page","link":"https:\/\/ictmatrix.com\/?page_id=522","title":{"rendered":"MITRE ATT&#038;CK Evaluations"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<p><strong>MITRE ATT&amp;CK techniques<\/strong><\/p>\n\n\n\n<p>The following MITRE attack techniques are describes how this is done.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>T1053.005 \u2013 Scheduled Task\/Job<\/code><\/pre>\n\n\n\n<p>Adversaries may use task scheduling to execute programs at system startup or on a scheduled basis for persistence.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>T1218.010 \u2013 Signed Binary Proxy Execution: Regsvr32<\/code><\/pre>\n\n\n\n<p>Regsvr32.exe is a Microsoft signed command-line program, which is used to register and unregister object linking and embedding controls, such as dynamic link libraries (DLLs), on Windows machines.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>T1518.001 \u2013 Software Discovery: Security Software Discovery<\/code><\/pre>\n\n\n\n<p>This technique aims to get a list of installed security software or defensive programs, available on a system or in a cloud environment. The results obtained can be used to shape subsequent attacks.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>T1548.002 \u2013 Abuse Elevation Control Mechanism: Bypass User Account Control<\/code><\/pre>\n\n\n\n<p>An attacker may bypass User Access Control (UAC) mechanisms to escalate privileges on the system.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>T1574.002 \u2013 Hijack Execution Flow: DLL Side-Loading<\/code><\/pre>\n\n\n\n<p>Adversaries may execute their own malicious payloads by side-loading DLLs. This technique involves hijacking a DLL that a legitimate application loads.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Example of SIEM Dashboard MITRE ATT&amp;CK<\/strong><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" width=\"1024\" height=\"470\" src=\"https:\/\/ictmatrix.com\/wp-content\/uploads\/2024\/12\/Mitre-1024x470.jpg\" alt=\"\" class=\"wp-image-523\" srcset=\"https:\/\/ictmatrix.com\/wp-content\/uploads\/2024\/12\/Mitre-1024x470.jpg 1024w, https:\/\/ictmatrix.com\/wp-content\/uploads\/2024\/12\/Mitre-300x138.jpg 300w, https:\/\/ictmatrix.com\/wp-content\/uploads\/2024\/12\/Mitre-768x353.jpg 768w, https:\/\/ictmatrix.com\/wp-content\/uploads\/2024\/12\/Mitre.jpg 1098w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>MITRE ATT&amp;CK techniques The following MITRE attack techniques are describes how this is done. Adversaries may use task scheduling to execute programs at system startup or on a scheduled basis for persistence. Regsvr32.exe is a Microsoft signed command-line program, which is used to register and unregister object linking and embedding controls, such as dynamic link<\/p><\/div>\n<div class=\"blog-btn\"><a href=\"https:\/\/ictmatrix.com\/?page_id=522\" class=\"home-blog-btn\">Meer lezen<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/ictmatrix.com\/index.php?rest_route=\/wp\/v2\/pages\/522"}],"collection":[{"href":"https:\/\/ictmatrix.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ictmatrix.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ictmatrix.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ictmatrix.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=522"}],"version-history":[{"count":3,"href":"https:\/\/ictmatrix.com\/index.php?rest_route=\/wp\/v2\/pages\/522\/revisions"}],"predecessor-version":[{"id":528,"href":"https:\/\/ictmatrix.com\/index.php?rest_route=\/wp\/v2\/pages\/522\/revisions\/528"}],"wp:attachment":[{"href":"https:\/\/ictmatrix.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=522"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}