The Nen-Book
LinkedinTwitterMediumGithubHTB
  • Whoami
  • Walkthroughs & Writeups
    • My CTF Methodology
    • Hack The Box Machines
      • Administrator
      • Escape two
      • Cicada
      • HTB Permx Machine(CVE-2023–4220 Chamilo LMS)
    • Intigriti 1337Up 2024
      • Intigriti 1337Up 2024-CTF OSINT Challenges
      • Intigriti 1337Up Live 2024-CTF Web Challenges
    • CyCTF Quals 2024
      • OSINT Challenges CyCTF Quals 2024
      • Old Friend OSINT Challenge CyCTF 2024 Quals Writeup
    • PicoCTF
      • PicoCTF 2024 Web Exploitation Challenges
      • PicoCTF 2024 General Skills Challenges
      • PicoCTF 2021 Web Exploitation Challenges Walkthrough
      • PicoCTF 2019 Web Exploitation Challenges
  • Web_AppSec
    • Web_Recon
    • SQli
    • ATO
    • Backend_Technology_Tricks
    • XSS
    • SSRF
    • CSRF
    • XXE
    • SSTI
    • Insecure_Deserialization
    • Open_Redirects
    • Information_Disclosures
    • Rate_Limiting
    • Clickjacking
    • Broken Access Control & IDORS
    • Bash_Scripting
    • Authentication_Vulnerabilities
    • App_Logic_Errors
  • Network & AD Pentesting
    • Scanning & Enumeration
    • Active_Directory
      • AD_Overview_&_ Lab Build
      • AD_Initial_Attack_Vectors
      • AD_Post-Compromise_Enumeration
      • AD_Post-Compromise_Attacks
    • Buffer_Overflow_Attacks
    • Web_Applications
    • Privilege_Escalation
  • Cloud_Security
    • AWS Pentesting
  • APISec
    • API_Recon
    • Broken_Access_Control & Info_Leaks
  • Code_Review
    • Source_Code_Review_101
    • Code Review Tools
  • Bug_Hunting
    • Picking_A_BugBounty_Program
    • Writing_A_Good_Report
  • MITRE ATT&CK
    • Introducing the ATT&CK Framework
    • MITRE Engenuity
    • Threat-Informed Defense
Powered by GitBook
On this page

Was this helpful?

Edit on GitHub
  1. MITRE ATT&CK

Introducing the ATT&CK Framework

PreviousMITRE ATT&CKNextMITRE Engenuity

Last updated 8 months ago

Was this helpful?

The MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) framework is a widely-used resource for understanding and defending against cyber threats. back when MITRE began working to develop a comprehensive approach to understanding and defending against advanced persistent threats (APTs).

This work led to the creation of the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) matrix in 2013, which was initially focused on APT threat groups and their tactics, techniques, and procedures (TTPs).

Over the years, the framework has evolved to include a wider range of threat actors, platforms, and use cases. In 2016, the framework was made publicly available, and it has since become a widely-used resource for organizations of all sizes and industries.

The MITRE ATT&CK framework is a widely used and important resource in the field of cybersecurity. It provides a comprehensive understanding of the tactics, techniques, and procedures used by cyber adversaries, which enables organizations to better identify, detect, and respond to cyber threats.

As you’ll remember, threat intelligence and data-based decisions are a major part of a threat informed defense. Understanding how your adversaries operate is incredibly valuable in defending your enterprise.

The framework is based on real-world observations of actual attacks, which means that it is constantly updated with new information and reflects the latest threat landscape. Additionally, The ATT&CK framework covers a wide range of threat actors, platforms, and use cases, and it can be used for not only detection and defense but also for planning and prioritizing security investments, measuring the effectiveness of security controls.

it also has a community of researchers, practitioners, and enthusiasts who contribute to its development and improvement.

MITRE allows for contribution to the ATT&CK Framework through the submission of:

  • New techniques and sub-techniques

  • New techniques and sub-techniques for macOS, Linux, cloud, and ICS

  • Threat Intelligence

  • Data sources such as endpoint or network log data for techniques used in incidents

  • Your use cases

The MITRE Organization has a whole page on its website on how to contribute to the ATT&CK Framework try visit:

that’s it for today’s talk

Contribute | MITRE ATT&CK®