Bengaluru, Karnataka, INDIA 560042
+91-9784367546, +91-8839669785
support@cyberwarfare.live

Tag: initial access

A Real World Adversary Labs

Email Security(T1566)

Email: Email, short for “Electronic mail” is one of the most used services by the netizens along with the web services. It allows them to communicate across the world sending messages to and from anyone with the help of known email addresses. It uses multiple TCP/IP protocols, for its functionality as mentioned below: SMTP: simple…
Read more

Drive-by-Compromise(T1189)

Introduction: In the past few years, browser-based exploitation has become one biggest security concern among security professionals. It’s been more difficult to implement detective and preventive measures against these types of attacks. Let us discuss the overview of drive-by compromise and brief information about some historical attack named Aurora exploit. Drive-by compromise is a technique…
Read more

Phishing(T1566)

Overview: Even though the internet is one of the man’s great creation, but it has remained as a root cause for many cyber attacks. Let us discuss about cyber punk who is the root cause for many data breaches that has happened till date. Phishing is a type of social engineering attack, where the attacker…
Read more

Replication Through Removable Media(T1091)

Overview: The above mentioned title” REPLICATION BY REMOVABLE MEDIA “ means spreading of a malevolent program through some removable devices like USB device, floppy, CD, External hard drives and etc. by copying or reproducing itself.   With the evolution in the field like IT industry, many advanced technologies and services came into existence. All these…
Read more

Valid Accounts(T1078)

Introduction: There’s no doubt about it, attackers want your credentials more than anything, especially administrative credentials. Valid accounts in a nutshell, “Accounts which are acceptable or authenticated”. One of the stages in the MITRE’s attack life cycle is the evasion of the defensive solutions put in place by the network defenders. Most cybersecurity defences are…
Read more

External Remote Services(T1133)

Introduction: Many organisations have seen a rise in security threats and attacks during the pandemic, as reported by a  cyber security firm. While 71% of those are IT and security professionals who were surveyed, reported an increase in security threats, while 61% of respondents said they were concerned about security risks caused by remote work.…
Read more

Exploit Public Facing Application(T1190)

Introduction: What would an attacker wish to do? It’s like, he/she will try to get ACCESS i.e. INITIAL ACCESS (trying various means to get into a secured network). After gaining access he/she can do many nefarious activities to name a few, we have: – Obtain lists of valid user, computer names and network information. Modify server and network configurations,…
Read more