Day 5 – MITRE ATT&CK Framework ;

Today students understand how attackers attack systems step-by-step.
MITRE ATT&CK is like a map of hacker behavior used worldwide by SOC teams.


🧠 What is MITRE ATT&CK? (Simple)

MITRE ATT&CK explains every stage of a cyber attack in an organized way.

It helps SOC analysts to:

  • Detect threats
  • Understand attacker behavior
  • Create alerts in SIEM
  • Do better investigations
  • Communicate clearly with teams

🏴‍☠️ Basic Explanation (With Easy Example)

Imagine a thief breaking into a house:

  1. Looks around
  2. Finds a weak door
  3. Breaks in
  4. Moves inside
  5. Steals things

MITRE ATT&CK has the same idea for cyber attacks.


🔥 14 MITRE ATT&CK Stages (Beginner-Level Explanation)

1. Reconnaissance

Attacker collects info.
Example: Scanning website, finding emails.

2. Resource Development

Attacker prepares tools.
Example: Creating malware, buying domains.

3. Initial Access

Attacker enters the system.
Example: Phishing, exploiting vulnerability.

4. Execution

Malicious code runs.
Example: Opening a malicious PDF, running PowerShell.

5. Persistence

Attacker stays inside.
Example: New admin user, startup script.

6. Privilege Escalation

Attacker becomes admin/root.
Example: Kernel exploit.

7. Defense Evasion

Avoid SOC, SIEM, antivirus.
Example: Clearing logs, disabling AV.

8. Credential Access

Stealing passwords.
Example: Keylogging, brute force, dumping LSASS.

9. Discovery

Understanding the environment.
Example: Listing users, servers, shares.

10. Lateral Movement

Moving to other systems.
Example: RDP to server using stolen password.

11. Collection

Gathering valuable data.

12. Command & Control (C2)

Attacker communicates with remote server.

13. Exfiltration

Stealing data out of the network.

14. Impact

Final damage.
Example: Ransomware, deleting data.


🧪 Real-Time Example (Tell Students)

Phishing → Ransomware Attack

StageWhat Happens
Initial AccessUser clicks phishing email
ExecutionMalware runs
PersistenceAttacker creates hidden account
Lateral MovementSpreads to servers
ExfiltrationSteals data
ImpactRansomware triggered

🔍 Day 5 Mini Hands-On Lab

In Splunk, run:

1. Failed logins

index=* fail

MITRE Stage: Credential Access

2. Top hosts

index=* | stats count by host

MITRE Stage: Discovery

3. Suspicious activity trend

index=* | timechart count

MITRE Stage: Execution / Discovery


🎤 Trainer Script

Speak this to make the concept easy:

“MITRE ATT&CK is like Google Maps for cyber attacks.
It tells us exactly where the attacker is in the attack chain, so we know how to respond.”


📝 Homework

Search online:
“MITRE ATT&CK real world attack examples”

Submit:

  • Attack name
  • MITRE stages
  • How SOC can detect it

Leave a comment

Recent posts

Quote of the week

in learning you will teach and in teaching you will learn

~ Phil Collins
Design a site like this with WordPress.com
Get started