Q: 12
What is the following step-by-step description an example of?
1. The attacker devises a non-default beacon profile with Cobalt Strike and embeds this within a
document.
2. The attacker creates a unique email with the malicious document based on extensive research
about their target.
3. When the victim opens this document, a C2 channel is established to the attacker’s temporary
infrastructure on a compromised website.
Options
Discussion
Option D had something like this in a mock and picked Technique.
C tbh. This is showing each action the attacker takes, in order, with details about tools and steps. That matches what I'd call a "procedure" in frameworks like MITRE ATT&CK. Techniques are more generic, this is much more specific. But if anyone's got a reason to pick D, open to hearing it.
Be respectful. No spam.
Question 12 of 15