Time
8 hours 28 minutes
Difficulty
Beginner
CEU/CPE
10

Video Transcription

00:00
hello and welcome to another application of the minor attack framework discussion. Today we're going to get into our next phase of the matter attack framework, and we're going to talk about collection. So to get a started, what is collection? So collection is
00:17
the threat. Actor is essentially collecting data of interest that meets their goals. So they have an objective in mind
00:23
and they're trying to meet that. And this will eventually or typically lead to some form of ex filtration as well as impact, which will be the ones that will be getting into a swell
00:34
now. Some common information of interest could include things like browser data, audio data, video data, email information, primarily looking for things that could either help them to get some type of financial gain or to get some type of information that would be to their benefit.
00:52
Now we're going to just be looking at a few sections within collection, and so we will focus on looking at audio capture, clipboard data and data from the local systems as far as the vector within the collection portion of the phase of the the minor attack framework. So with that in mind, I want to thank you for your time today,
01:11
and I look forward to seeing you again.
01:12
Sen.

Up Next

Application of the MITRE ATT&CK Framework

This MITRE ATT&CK training is designed to teach students how to apply the matrix to help mitigate current threats. Students will move through the 12 core areas of the framework to develop a thorough understanding of various access ATT&CK vectors.

Instructed By

Instructor Profile Image
Robert Smith
Director of Security Services at Corsica
Instructor