Background: Inculcating an attacker mindset (i.e. learning to think like an attacker) is an essential skill for engineers and administrators to improve the overall security of software. Describing the approach that adversaries use to discover and exploit vulnerabilities to infiltrate software systems can help inform such an attacker mindset. Aims: Our goal is to assist developers and administrators in inculcating an attacker mindset by proposing an approach to codify attacker behavior in cybersecurity penetration testing competition. Method: We use an existing multimodal dataset of events captured during the 2018 National Collegiate Penetration Testing Competition (CPTC’18) to characterize the approach a team of attackers used to discover and exploit vulnerabilities. Results: We collected 44 events to characterize the approach that one of the participating teams took to discover and exploit seven vulnerabilities. We used the MITRE ATT&CK™ framework to codify the approach in terms of tactics and techniques. Conclusions: We show that characterizing attackers’ campaign as a chronological sequence of MITRE ATT&CK™ tactics and techniques is feasible. We hope that such a characterization can inform the attacker mindset of engineers and administrators in their pursuit of engineering secure software systems.
[1]
J. R. Landis,et al.
The measurement of observer agreement for categorical data.
,
1977,
Biometrics.
[2]
Peng Ning,et al.
Learning attack strategies from intrusion alerts
,
2003,
CCS '03.
[3]
Shouhuai Xu,et al.
Extracting attack narratives from traffic datasets
,
2016,
2016 International Conference on Cyber Conflict (CyCon U.S.).
[4]
J. A. Battaglia,et al.
Finding Cyber Threats with ATT&CK-Based Analytics
,
2017
.