🕶️
VICEINTELPRO
GitHub: HorrorClause
  • In Tenebris Videmus
  • 🚩CTFs
    • 💾Hack the Box
      • 🏫Academy
        • Command Injection Assessment
        • XSS Assessment
        • Web Attacks Assessment
    • Try Hack Me
      • In Progress
  • 📖Documents
  • 👨‍🏫HOW-TOs
    • Obisidian How-To
    • Setup Mandiant FLARE VM
  • 📑Security Fundamentals
    • Security Controls
      • Physical Security
      • Endpoint Security
      • Email Security
      • Network Security
      • AAA Controls
    • Networking 101
      • OSI Model
      • Network Fundamentals
      • Network Devices
      • Network Tools
      • Protocols and Ports
    • 👨‍💼Management Principles
      • Risk
      • Policies and Procedures
      • Compliance and Frameworks
      • Change and Patch Management
  • 🛡️Security Concepts
    • ⚠️Risk Assessment Models
      • DREAD Risk Assessment Model
      • STRIDE Threat Model
      • Common Vulnerability Scoring System (CVSS)
    • Pentesting
      • Common Terms
      • AV Identification-Evasion
      • Introduction to Payloads
      • Automating Payloads & Delivery with Metasploit
      • Shells Jack Us In, Payloads Deliver Us Shells
      • Web Shells
      • Pentesting Overview
      • Penetration Testing Process
    • 🐛Vulnerability Assessment
      • Common Vulnerabilities and Exposures (CVE)
      • Common Vulnerability Scoring System (CVSS)
      • Assessment Standards
      • Vulnerability Assessment
      • Vulnerability Scanning
      • Reporting
      • 🎯Nessus
        • Getting Started with Nessus
        • Nessus Scan
        • Working with Nessus Scan Output
        • Advanced Settings
        • Scanning Issues
      • 🦴OpenVAS (Greenbone)
        • Getting Started with OpenVAS
        • OpenVAS
        • Exporting Results
    • Passwords
      • Password Managers
      • Password Policies
      • Password Security Fundamentals
    • Frameworks
    • GRC
    • Logon Types
    • What is Dev-Null ?
  • ⚔️Offensive Security
    • OSINT
      • OSINT - Websites
      • Google Dorks
    • 🔫Attacking Common Services
      • The Concept of Attacks
      • Interacting with Common Services
      • Finding Sensitive Information
      • Attacking DNS
      • Attacking Email Services
      • Attacking FTP
      • Attacking RDP
      • Attacking SMB
      • Attacking SQL Databases
      • Cheat Sheet - Attacking Common Services
      • Service Misconfigurations
    • 🔪Attacking Web Apps with Ffuf
      • Web Fuzzing
      • Directory Fuzzing
      • Page Fuzzing
      • Recursive Fuzzing
      • DNS Records
      • Sub-domain Fuzzing
      • Vhost Fuzzing
      • Filtering Results
      • Parameter Fuzzing - GET
      • Parameter Fuzzing - POST
      • Value Fuzzing
    • ☁️Cloud
      • AWS
        • AWS S3 Buckets
    • 💉Command Injection
      • Command Injection Cheat Sheet
      • Intro to Command Injections
      • Detection
      • Injecting Commands
      • Other Injection Operators
      • Identifying Filters
      • Bypassing Space Filters
      • Bypassing Other Blacklisted Characters
      • Bypassing Blacklisted Commands
      • Advanced Command Obfuscation
      • Evasion Tools
      • Command Injection Prevention
    • Containers
      • Docker
    • ❌Cross-Site Scripting (XSS)
      • Introduction to XSS
      • Stored XSS
      • Reflected XSS
      • DOM XSS
      • XSS Discovery
      • Defacing
      • Phishing
      • Session Hijacking
      • XSS Prevention
    • Directory Busting
      • DirB
      • DirBuster
      • Ffuf
      • Gobuster
    • 🅰️DNS
      • DNSRecon
      • Fierce
    • File Inclusion
      • Local File Inclusion Cheatsheet
      • Intro to File Inclusion
      • Local File Inclusion (LFI)
      • Basic Bypass
      • PHP Filters
      • PHP Wrappers
      • Remote File Inclusion (RFI)
      • LFI and File Uploads
      • Log Poisoning
      • Automated Scanning
      • File Inclusion Prevention
    • File Transfers
      • Transferring Files
      • File Transfer - Quick Commands
      • Living off the Land
      • Windows File Transfer Methods
      • Linux File Transfer Methods
      • Catching Files over HTTP(S)
      • Transferring Files with Code
      • Miscellaneous File Transfer Methods
      • Protected File Transfers
      • Mounting Encrypted VHD Drives
      • Mounting VHD in Kali
      • File Transfer Detection
    • File Upload Attacks
      • File Upload Cheatsheet
      • Absent Validation
      • Upload Exploitation
      • Client-Side Validation
      • Blacklist Filters
      • Whitelist Filters
      • Type Filters
      • Limited File Uploads
      • Other Upload Attacks
      • Preventing File Upload Vulnerabilities
    • 👣Footprinting
      • Linux Remote Management Protocols
      • Windows Remote Management Protocols
      • Enumeration
        • Enumeration Methodology
        • 🖥️Host Based
          • Quick Commands
          • DNS
          • FTP
          • IMAP-POP3
          • IPMI
          • MSSQL
          • MySQL
          • NFS
          • Oracle TNS
          • SMB
  • Powershell
    • Powershell CheatSheet
  • Python
    • Map
    • Anonymous Functions
    • Recursion
      • ZipMap
      • Nested Sum
      • Recursion on a Tree
      • Count Nested Levels
      • Longest Word
    • Function Transformations
      • More Transformations
      • Why Transform?
    • Closures
    • Currying
    • Decorators
    • Sum Types
    • Enums
    • Match
    • Regex
  • Kusto (KQL)
    • SQL and KQL Comparison
    • Using the Where and Sort Operators
    • KQL Queries
  • HTML
  • Insecure File Uploads
Powered by GitBook
On this page
  • Lockheed Martin Cyber Kill Chain
  • MITRE ATT&CK
  • MITRE ATT&CK Navigator
  • Pyramid of Pain
  • Attack Indicators
  • Emulating Indicators of Attack
  • The Pyramid of Pain
  • Types of Indicators
  • The Pyramid Explained
  • Effective Use of APT1 Indicators
  • Unified Kill Chain
  • Whitepaper
  1. Security Concepts

Frameworks

PreviousPassword Security FundamentalsNextGRC

Last updated 4 months ago

This section of Vice City Intelligence Project covers key cybersecurity frameworks and attack models used for threat analysis, defense strategies, and risk management. From MITRE ATT&CK and Lockheed Martin’s Cyber Kill Chain to the Unified Kill Chain, these models provide structured insights into how cyber threats operate and how organizations can defend against them.

You'll also find information on MITRE ATT&CK Navigator, a powerful tool for visualizing adversary tactics, as well as governance, risk, and compliance (GRC) frameworks that guide cybersecurity policies. Whether you're conducting pentesting, vulnerability assessments, or security operations, these frameworks are essential for understanding and mitigating threats effectively.


Lockheed Martin Cyber Kill Chain

The Lockheed Martin Cyber Kill Chain is a cybersecurity framework that outlines the stages of a cyberattack, from initial reconnaissance to data exfiltration. It helps defenders understand and disrupt adversary tactics by breaking attacks into seven phases: Reconnaissance, Weaponization, Delivery, Exploitation, Installation, Command & Control (C2), and Actions on Objectives. By identifying threats at each stage, organizations can strengthen their defenses and improve threat detection and response.


MITRE ATT&CK

The MITRE ATT&CK Framework is a comprehensive knowledge base of adversary tactics, techniques, and procedures (TTPs) used in real-world cyberattacks. It provides a structured approach to understanding how attackers operate across different stages of an attack, from initial access to impact. The framework is widely used for threat intelligence, detection engineering, and security assessments, helping organizations strengthen their defenses by mapping attacks to specific techniques and developing effective countermeasures.

MITRE ATT&CK Navigator

The MITRE ATT&CK Navigator is a web-based tool designed to help cybersecurity professionals visualize and interact with the MITRE ATT&CK Framework. It allows users to map out adversary tactics, techniques, and procedures (TTPs), customize heatmaps for threat detection, and layer different datasets for analysis. The tool is widely used for threat modeling, detection engineering, and security gap assessments, enabling teams to prioritize defenses and track mitigation efforts effectively.


Pyramid of Pain

Attack Indicators

As you can see in the above diagram, each level of the pyramid represents different types of attack indicators you might use to detect an adversary’s activities and is broken up by how much pain it will cause them when you are able to deny those indicators to them.

As an example, If an adversary is using malware to infect an endpoint within their attack chain and as a defender you are using file hash values to detect such behavior, it is trivial for them to recompile the malware sample such that the file hash value you are using to detect the original sample, is rendered useless. Attackers can and do routinely use polymorphic or metamorphic engines to easily recompute these samples in real-time as they are downloaded to the compromised machines. On the other hand, if your network security controls use IP address, CIDR block or even ASN range blacklists to detect malicious network communication an attacker could move their command and control infrastructure or operations center to another network server, rendering the IP address range you were blocking no longer valuable.

One level of the pyramid that has more value than any other level is Attacker TTPs. If a defender can detect or prevent attacker behavior (e.g. MITRE ATT&CK) vs basic artifacts like file hashes or IP addresses, then they make it more costly and more painful for an attacker to pivot their path. To detect and prevent attacker behavior a defender must have security capabilities that use heuristical algorithms which are tougher to build for detection and/or prevention but provide the most resilient security stack.

You can review David’s blog further to go over how each indicator is helpful specifically for incident response and threat hunting, but in this blog, I’m going to briefly review how each level of the pyramid can be used to emulate attacker indicators and validate your security controls.

Emulating Indicators of Attack

Indicator of Attack

How to Emulate Attacker Activities and Validate Security Controls

Hash Values

-Retrieve malware sample based on file hash value -Pass malware sample through network from one endpoint to another endpoint -Use integrations into security stack to measure prevention and detection technologies for gaps and evidence of true positives

IP Addresses

-Emulate connection to destination host IP address e.g. 6.6.6.6 -Use analytics from emulation and integrations into security stack to measure prevention and detection technologies for gaps and evidence of true positives or error that IP address is not accessible

Domain Names

-Emulate connection to destination network host domain name e.g. badguy.com -Use analytics from emulation and integrations into security stack to measure prevention and detection technologies for gaps and evidence of true positives or error that IP address is not accessible

Network Artifacts

-Emulate Observables related to the content of various traffic protocols including exact C&C protocol to destination network resource including URI patterns, C2 information embedded in network protocols, distinctive HTTP User-Agent or SMTP Mailer values, etc. -Use analytics from emulation and integrations into security stack to measure prevention and detection technologies for gaps and evidence of true positives or error that destination network resource is down

Host Artifacts

-Emulate specific observables on one or more endpoint/host devices including changes to registry keys or values known to be created by specific pieces of malware, files or directories dropped in certain places or using certain names, names or descriptions or malicious services or almost anything else that’s distinctive -Use analytics from emulation and integrations into security stack to measure prevention and detection technologies for gaps or evidence of true positives

Tools

-Emulate software adversary uses to accomplish their mission e.g Tor, Windows Task Scheduler, GCC, Powershell, etc. The software itself might not be directly malicious, but the specific use, time or location might be indicative of malicious or at least suspicious -Use analytics from emulation and integrations into security stack to measure prevention and detection technologies for gaps or evidence of true positives

Tactics, Techniques and Procedures (TTPs)

-Emulate single or multi-phase attack tactics, techniques and procedures that replicate a pattern of behavior e.g. “Spearphishing with a trojaned PDF file” or “… with a link to a malicious .SCR file disguised as a ZIP” or “Dumping cached authentication credentials and reusing them in Pass-the-Hash attacks” -Use analytics from emulation and integrations into security stack to measure prevention and detection technologies for gaps or evidence of true positives that artifacts have been detected for each phase of the attack chain

After seeing how these indicators were being applied, though, I came to realize something very interesting: almost no one is using them effectively.

I put that statement in bold, because it's a little bit of a challenge, and I'm sure it will surprise many readers. The entire point of detecting indicators is to respond to them, and once you can respond to them quickly enough, you have denied the adversary the use of those indicators when they are attacking you. Not all indicators are created equal, though, and some of them are far more valuable than others.

The Pyramid of Pain

To illustrate this concept, I have created what I like to call the Pyramid of Pain. This simple diagram shows the relationship between the types of indicators you might use to detect an adversary's activities and how much pain it will cause them when you are able to deny those indicators to them. Let's examine this diagram in more detail.

Types of Indicators

Let's start by simply defining types of indicators make up the pyramid:

  1. Hash Values: SHA1, MD5 or other similar hashes that correspond to specific suspicious or malicious files. Often used to provide unique references to specific samples of malware or to files involved in an intrusion.

  2. IP Addresses: It's, um, an IP address. Or maybe a netblock.

  3. Domain Names: This could be either a domain name itself (e.g., "evil.net") or maybe even a sub- or sub-sub-domain (e.g., "this.is.sooooo.evil.net")

  4. Network Artifacts: Observables caused by adversary activities on your network. Technically speaking, every byte that flows over your network as a result of the adversary's interaction could be an artifact, but in practice this really means those pieces of the activity that might tend to distinguish malicious activity from that of legitimate users. Typical examples might be URI patterns, C2 information embedded in network protocols, distinctive HTTP User-Agent or SMTP Mailer values, etc.

  5. Host Artifacts: Observables caused by adversary activities on one or more of your hosts. Again, we focus on things that would tend to distinguish malicious activities from legitimate ones. They could be registry keys or values known to be created by specific pieces of malware, files or directories dropped in certain places or using certain names, names or descriptions or malicious services or almost anything else that's distinctive.

  6. Tools: Software used by the adversary to accomplish their mission. Mostly this will be things they bring with them, rather than software or commands that may already be installed on the computer. This would include utilities designed to create malicious documents for spearphishing, backdoors used to establish C2 or password crackers or other host-based utilities they may want to use post-compromise.

  7. Tactics, Techniques and Procedures (TTPs): How the adversary goes about accomplishing their mission, from reconnaissance all the way through data exfiltration and at every step in between. "Spearphishing" is a common TTP for establishing a presence in the network. "Spearphishing with a trojaned PDF file" or "... with a link to a malicious .SCR file disguised as a ZIP" would be more specific versions. "Dumping cached authentication credentials and reusing them in Pass-the-Hash attacks" would be a TTP. Notice we're not talking about specific tools here, as there are any number of ways of weaponizing a PDF or implementing Pass-the-Hash.

The Pyramid Explained

Now that we have a better idea what each of the indicator types are, let's take a look at the pyramid again. The widest part of the pyramid is colored green, and the pinnacle of the pyramid is red. Both the width and the color are very important in understanding the value of these types of indicators.

Hash Values

Most hash algorithms compute a message digest of the entire input and output a fixed length hash that is unique to the given input. In other words, if the contents of two files varies even by a single bit, the resultant hash values of the two files are entirely different. SHA1 and MD5 are the two most common examples of this type of hash.

On the one hand, hash indicators are the most accurate type of indicator you could hope for. The odds of two different files having the same hash values are so low, you can almost discount this possibility altogether. On the other hand, any change to a file, even an inconsequential one like flipping a bit in an unused resource or adding a null to the end, results in a completely different and unrelated hash value. It is so easy for hash values to change, and there are so many of them around, that in many cases it may not even be worth tracking them.

IP Addresses

IP addresses are quite literally the most fundamental indicator. Short of data copied from local hard drive and leaving the front door on a USB key, you pretty much have to have an network connection of some sort in order to carry out an attack, and a connection means IP Addresses. It's at the widest part of the pyramid because there are just so many of them. Any reasonably advanced adversary can change IP addresses whenever it suits them, with very little effort. In some cases, if they are using a anonymous proxy service like Tor or something similar, they may change IPs quite frequently and never even notice or care. That's why IP Addesses are green in the pyramid. If you deny the adversary the use of one of their IPs, they can usually recover without even breaking stride.

Domain Names

One step higher on the pyramid, we have Domain Names (still green, but lighter). These are slightly more of a pain to change, because in order to work, they must be registered, paid for (even if with stolen funds) and hosted somewhere. That said, there are a large number of DNS providers out there with lax registration standards (many of them free), so in practice it's not too hard to change domains. New domains may take anywhere up to a day or two to be visible throughout the Internet, though, so these are slightly harder to change than just IP addresses.

Network & Host Artifacts

Smack in the middle of the pyramid and starting to get into the yellow zone, we have the Network and Host Artifacts. This is the level, at last, where you start to have some negative impact on the adversary. When you can detect and respond to indicators at this level, you cause the attacker to go back to their lab and reconfigure and/or recompile their tools. A great example would be when you find that the attacker's HTTP recon tool uses a distinctive User-Agent string when searching your web content (off by one space or semicolon, for example. Or maybe they just put their name. Don't laugh. This happens!). If you block any requests which present this User-Agent, you force them to go back and spend some time a) figuring out how you detected their recon tool, and b) fixing it. Sure, the fix may be trivial, but at least they had to expend some effort to identify and overcome the obstacle you threw in front of them.

Tools

The next level is labelled "Tools" and is definitely yellow. At this level, we are taking away the adversary's ability to use one or more specific arrows in their quiver. Most likely this happens because we just got so good at detecting the artifacts of their tool in so many different ways that they gave up and had to either find or create a new tool for the same purpose. This is a big win for you, because they have to invest time in research (find an existing tool that has the same capabilities), development (create a new tool if they are able) and training (figure out how to use the tool and become proficient with it). You just cost them some real time, especially if you are able to do this across several of their tools.

Some examples of tool indicators might include AV or Yara signatures, if they are able to find variations of the same files even with moderate changes. Network aware tools with a distinctive communication protocol may also fit in this level, where changing the protocol would require substantial rewrites to the original tool. Also, as discussed above, fuzzy hashes would probably fall into this level.

Tactics, Techniques & Procedures

Finally, at the apex are the TTPs. When you detect and respond at this level, you are operating directly on adversary behaviors, not against their tools. For example, you are detecting Pass-the-Hash attacks themselves (perhaps by inspecting Windows logs) rather than the tools they use to carry out those attacks. From a pure effectiveness standpoint, this level is your ideal. If you are able to respond to adversary TTPs quickly enough, you force them to do the most time-consuming thing possible: learn new behaviors.

Let's think about that some more. If you carry this to the logical extreme, what happens when you are able to do this across a wide variety of the adversary's different TTPs? You give them one of two options:

  1. Give up, or

  2. Reinvent themselves from scratch

If I were the adversary, Option #1 would probably look pretty attractive to me in this situation.

Effective Use of APT1 Indicators

Now that we've covered all that background, we can finally turn our attention back to the APT1 indicators. I said that almost no one was making effective use of them. What did I mean by that, and what constitutes "effective use"?

This is all good and proper, but I haven't seen a lot of discussion centering around the data they provided on the behavior of the Comment Crew tools themselves. Appendix A is a giant data dump of some very good information regarding host and network artifacts for 40+ tools known to be in use by this group.

Whenever you receive new intel on an adversary (whether it be APT1/Comment Crew or any other threat actor), review it carefully against the Pyramid of Pain. For every paragraph, ask yourself "Is there anything here I can use to detect the adversary's activity, and where does this fall on the pyramid?" Sure, take all those domains and IPs and make use of them if you can, but keep in mind that the amount of pain you cause an adversary depends on the types of indicators you are able to make use of, and create your plan accordingly.


Unified Kill Chain

The Unified Kill Chain (UKC) is a cybersecurity attack model introduced by Paul Pols to provide a more comprehensive view of modern cyber threats, including Advanced Persistent Threats (APTs) and ransomware. It extends and unifies existing models like the Lockheed Martin Cyber Kill Chain and MITRE ATT&CK, addressing their limitations by incorporating social engineering, pivoting, and attacks beyond the perimeter. Unlike traditional models that assume attackers follow a strict sequence, the UKC recognizes that attack phases can be bypassed, reshaping defensive strategies toward layered defense, assume breach, and defense in depth. This model helps organizations analyze, compare, and defend against targeted and non-targeted attacks, improving resilience in an evolving threat landscape.

Whitepaper

(Tutorial article)

MITRE ATT&CK IR PAGE:

Almost all the levels of indicators have an ephimal value that decays over time. Thus, the importance of maturing your security program to incorporate Threat intelligence to provide an ongoing feed of which will include relevant attack indicators.

On February 18th, put a major hole in the APT intelligence dam when they released their profiling a group commonly referred to as Comment Crew. There followed a small flood of reports from other entities like the (and ) and the . Most of the furor over the APT1 report was regarding it's findings suggesting that APT1 is actually the PLA's Unit 61398. This is solid work, and a real breakthrough in the public policy area, but I was a lot more excited about the detailed technical information included in the reports' seven appendices (not including the video appendix).

You may also encounter so-called fuzzy hashes, which attempt to solve this problem by computing hash values that take into account similarities in the input. In other words, two files with only minor or moderate differences would have fuzzy hash values that are substantially similar, allowing an investigator to note a possible relationship between them. is an example of a tool commonly used to compute fuzzy hashes. Even though these are still hash values, they probably fit better at the "Tools" level of the Pyramid than here, because they are more resistant to change and manipulation. In fact, the most common use for them in DFIR is to identify variants of known tools or malware, in an attempt to try to rectify the shortcomings of more static hashes.

What I meant was that I see a lot of discussion about the long list of domain names included in Appendix D (and to a lesser extent, the domains and IPs included in the DHS/FBI and Symantec reports as well). of the project even put out that you could use to search for those domains in your network traffic.

has published a set of Snort signatures that cover many of these, and I'm quite sure many of us have produced our own, but I find the lack of attention to these curious. Maybe the ET rules are already serving everyone's needs and so there's no need to talk about them? More likely, though, I think a lot of organizations have not properly reviewed the reports for detection indicators.

🛡️
MITRE ATT&CK Framework
Getting Started with ATT&CK: Threat Intelligence
MITRE ATT&CK Framework
https://attack.mitre.org/matrices/enterprise/
Pyramid of Pain
micro-threat intelligence
Mandiant
APT1 report
Symantec
this
DHS/FBI
Ssdeep
Seth Hall
Bro-IDS
a neat Bro module
Emerging Threats
Lockheed Martin Cyber Kill Chain
2MB
The-Unified-Kill-Chain.pdf
pdf
Phases of the Unified Kill Chain
ATT&CK® Navigator
Logo