MITRE ATTACK for iPhone

MITRE ATTACK for iPhone

Assessment

Interactive Video

Information Technology (IT), Architecture

University

Hard

Created by

Quizizz Content

FREE Resource

The video tutorial provides an overview of the Mitra attack framework for iOS, detailing various tactics and techniques used by adversaries. It covers initial access methods like drive-by compromise, execution techniques using command and scripting interpreters, and persistence through binary modification. The tutorial also discusses privilege escalation via software vulnerabilities, defense evasion by downloading dynamic code, and credential access by searching common storage locations. Additionally, it explains location tracking using OS APIs and remote service exploitation. The video concludes with a summary of the attack chain and directs viewers to attack.miter.org for more information.

Read more

2 questions

Show all answers

1.

OPEN ENDED QUESTION

3 mins • 1 pt

Describe how adversaries may evade defenses by downloading new code at runtime.

Evaluate responses using AI:

OFF

2.

OPEN ENDED QUESTION

3 mins • 1 pt

What methods do adversaries use for credential access on mobile devices?

Evaluate responses using AI:

OFF