ATT&CK® Navigator

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
1 hour
Difficulty
Beginner
CEU/CPE
2
Video Transcription
00:00
welcome to the fourth and final lesson of module to
00:03
attack Navigator.
00:07
In this lesson, we will explore the structure and purpose of the Attack Navigator
00:11
and appreciate how this tool can allow us to create custom attack visualizations.
00:20
Until now, you might have been wondering how I've made all these awesome attack visualizations
00:24
and this lesson I'm going to share my secret.
00:30
The Attack Navigator is a tool designed to provide basic navigation and annotation of attack matrices.
00:38
The attack navigator allows us to manipulate the cells in the matrix,
00:42
adding color comments assigning numerical values are capturing into the metrics or notes.
00:49
This function is really important, especially when we think about these quantitative score cards from the previous lesson,
00:55
as the attack Navigator allows to visualize various metrics such as defensive coverage, output of red and blue teams, frequency of detective techniques
01:03
or any other metrics that we want to capture and present.
01:11
Each custom view created by the Navigator is called a layer,
01:15
and these layers can be created interactively within the tool or generated using the custom Jason format for the navigator.
01:23
These layers can also be exported and shared between analysts.
01:32
Full source code and documentation for the Navigator are available at our attack Navigator. Get Hub repository.
01:38
These instructions include how to stand up and run your own instance of Navigator,
01:44
but we also host one online for everyone to use.
01:52
I definitely recommend getting your own hands on experience with the Navigator.
01:56
Here's a quick introduction to how to control and use the Navigator tool.
02:00
As you can see, The Matrix have presented the bottom
02:04
where you can select each individual cell or technique.
02:09
There's also a control panel. The top 1000 to perform various other actions,
02:15
such as selecting techniques based on their mapping, is two groups software or mitigations.
02:22
We can also use these controls to add color or various other annotations to selected cells.
02:30
And once done, we can export these layers into Jason Excel or image formats.
02:39
Attack Navigator allows us to create new layers
02:43
as well as build on our open existing layers.
02:47
We can also create layers based on the various matrices with an attack such as Enterprise Mobile or even I C s.
02:58
And with that, we need to acknowledge check for less than four.
03:00
Which of the following is not true about the attack Navigator,
03:05
please positive video and take a second to think about the correct answer before proceeding.
03:14
In this case, the correct answer was a
03:16
attack. Navigator allows us to create custom visualizations but not edit attack content.
03:24
And with that, we reached the end of lesson for
03:28
in summary, the attack navigator enables us to annotate, save and share customized views of attack known as layers.
03:35
And these layers can capture many types of data map to the techniques with an attack.
03:43
And with that, we reached the end of model to
03:46
in this module we explore the various benefits of using attack,
03:49
including the diversity of information and perspective. Capture within the framework.
03:53
The common language for describing adversary behavior is provided by attack
03:57
and how attack can allow us to create
04:00
and produce cybersecurity, metrics and scorecards very often with the attack navigator.
Up Next