Mansoor Barri
Aug 18, 2023

THM | Intro to Cyber Threat Intel

Introduction

No answer required

Cyber Threat Intelligence

What does CTI stand for?

Cyber Threat Intelligence

IP addresses, Hashes and other threat artefacts would be found under which Threat Intelligence classification?

Technical Intel

CTI Lifecycle

At which phase of the CTI lifecycle is data converted into usable formats through sorting, organising, correlation and presentation?

Processing

During which phase do security analysts get the chance to define the questions to investigate incidents?

Direction

CTI Standards & Frameworks

What sharing models are supported by TAXII?

Collection and Channel

When an adversary has obtained access to a network and is extracting data, what phase of the kill chain are they on?

Actions on Objectives

Practical Analysis

What was the source email address?

vipivillain@badbank.com

What was the name of the file downloaded?

flbpfuh.exe

After building the threat profile, what message do you receive?

THM{NOW_I_CAN_CTI}

that’s it ❤

Mansoor Barri
Mansoor Barri

Written by Mansoor Barri

Profile designed to share technology content about Penetration testing, Linux and Windows.

No responses yet