OT 130: MITRE ATT&CK Matrix for ICS (25 pts)

What You Need

Purpose

MITRE ATT&CK enumerates tactics and techniques used by attackers. It's used to design and evaluate penetration testing tools and defense measures.

This project uses MITRE ATT&CK Matrix for ICS v 17. Open the link below in another tab and use it to answer the questions below. Each answer is worth 2 points.

MITRE ATT&CK Matrix for ICS v 17

OT 130.1: Rogue Masters Mitigation

What mitigation to prevent the Rogue Masters technique prevents devices from accepting connections from unauthorized systems? The flag is the M number for that mitigation, like M0101.

OT 130.2: Native API Detection

What detection method works on the RNative API technique? The flag is the DS number for that mitigation, like DS0101.

OT 130.3: Ethernet Card

What persistence technique modifies the code running on the Ethernet card? The flag is the T number for that technique, like T0891.

OT 130.4: Event Logs

What evasion technique includes deleting event logs? The flag is the T number for that mitigation, like T0101.

OT 130.5: M0808

What discovery technique is mitigated by M0808? The flag is the T number for that mitigation, like T0101.

OT 130.6: MS17-010

An attacker performs lateral movement using the MS17-010 vulnerability. What technique is that? The flag is the T number for that mitigation, like T0101.

OT 130.7: No Mitigation

What collection technique has no effective mitigation, and targets Jump Hosts? The flag is the T number for that mitigation, like T0101.

OT 130.8: Password

What Inhibit Response Function technique includes adding a password to a system that lacks one? The flag is the T number for that mitigation, like T0101.

OT 130.9: Errors

What Impair Process Control technique involves sending false error messages to the operators? The flag is the T number for that mitigation, like T0101.

OT 130.10: Documents

What Impact technique includes downloading design documents? The flag is the T number for that mitigation, like T0101.

Posted 4-24-25