DEV Community

AJ
AJ

Posted on

1

Pyramid Of Pain

Pyramid of pain

Pyramid of pain is about determining the level of difficulty it will cause for an attacker to change the indication associated with them and their group

Image description

The pyramid is at the top indicates the most difficult part to change and lowest is the easiet.

Hashes

Hashes is a way of authenticating the legitimate of file, message etc. It takes one input and generates a fixed sized hash value. A hash algorthim is considered to be not secure if 2 files can have same hash value.

If the attacker tries to use a known malware the hash of the malware can be compared against already known malware hashes in a database to detect if its malicious.

Tools you can use to do hash lookups:

  • VirusTotal
  • MetaDefender Cloud - OPSWAT

Powershell script to get file hash
Get-FileHash .\Filename.txt -Algorthim MD5

IP

Ip address are used to uniquely identify devices connect to a network in order to receive and send information over the network. In the pyramid of pain, ip addresses are indicated with color green. From defense prespective you can block, deny, drop requests from certain ip addresses but this wont work on experienced attacker they can just change to a new ip address.

Websites to find harmful ip adresses

Domain names

Domain Names can be thought as simply mapping an IP address to a string of text

many DNS providers have a very low standards and they provide APIs which makes it even easier for an attacker to change the domain.

Punycode is a way of converting words that cannot be written in ASCII, into a Unicode ASCII encoding.

Url shortening links:

  • bit.ly
  • goo.gl
  • ow.ly
  • s.id

Network Artifacts (Yellow zone)

A network artifact can be a user-agent string, C2 information, or URI patterns followed by the HTTP POST requests.

Network artifacts can be detected in Wireshark PCAPs (file that contains the packet data of a network) by using a network protocol analyzer such as TShark or exploring IDS (Intrusion Detection System) logging from a source such as Snort.

If you can detect the custom User Agent strings that the attacker is using, you might be able to block them, creating more obstacles and making their attempt to compromise the network more annoying.

Tools (challengin)

Attacker usually use utlities such as:

  • Malicious macro documents for spear phishing attempts
  • A backdoor that can be used to establish C2
  • Any custom .exe and .dll files, payloads, password crackers

TTPS (Tough)

TTPs stands for Tactics, Techniques & Procedures. This includes the whole MITRE ATT&CK Matrix, which means all the steps taken by an attacker to achieve their goal, starting from phishing attempts to persistence and data exfiltration.

Quadratic AI

Quadratic AI – The Spreadsheet with AI, Code, and Connections

  • AI-Powered Insights: Ask questions in plain English and get instant visualizations
  • Multi-Language Support: Seamlessly switch between Python, SQL, and JavaScript in one workspace
  • Zero Setup Required: Connect to databases or drag-and-drop files straight from your browser
  • Live Collaboration: Work together in real-time, no matter where your team is located
  • Beyond Formulas: Tackle complex analysis that traditional spreadsheets can't handle

Get started for free.

Watch The Demo 📊✨

Top comments (0)

Image of Timescale

PostgreSQL for Agentic AI — Build Autonomous Apps on One Stack ☝️

pgai turns PostgreSQL into an AI-native database for building RAG pipelines and intelligent agents. Run vector search, embeddings, and LLMs—all in SQL

Build Today

👋 Kindness is contagious

Engage with a wealth of insights in this thoughtful article, valued within the supportive DEV Community. Coders of every background are welcome to join in and add to our collective wisdom.

A sincere "thank you" often brightens someone’s day. Share your gratitude in the comments below!

On DEV, the act of sharing knowledge eases our journey and fortifies our community ties. Found value in this? A quick thank you to the author can make a significant impact.

Okay