Technical Documentation
WebsiteLinkedIn
  • Technical Documentation
  • Admin Guides
    • Epiphany Intelligence Platform Administrator Guide
      • Epiphany Intelligence Platform Overview
      • Using Epiphany: A Quickstart Guide
      • Epiphany Tools
        • Dashboards
        • Path Finder
          • Path Finder Search Strings
        • Impact Matrix
        • Vulnerabilities
        • Rogue Report
          • Coverage Area
          • Host List and the Query Builder
        • Inventory
          • Active Directory
        • Tickets
          • Creating Tickets
          • Adding comments to a ticket
          • Ticket Activity
          • Closing A Ticket
          • Reveald Ticket Synchronization
          • Supported Markdown
      • Administration
        • User Management
        • Source Management
          • Site Collectors Setup
          • Cloud-Based Data Sources
            • Data Source Examples
          • On-Prem Data Sources
            • Example
      • Search and Query Guidelines
        • Search Basics
        • Query Operators
        • Complex Epiphany Queries
        • Search Keywords
      • Other Resources
    • Epiphany Validation Engine User's Guide
      • Chapter 1: Architecture of EVE
        • Endpoint
        • Platform
      • Chapter 2 : EVE Endpoint
        • Hardware Requirements
        • Operating System Requirements
        • Custom Threat Module Requirements
        • EVE Agent Requirements
          • Endpoint (physical or VM) with Golden Image.
          • Exclusion of E.V.E. paths in third-party Endpoint solutions
          • Third-party communications configuration in the EVE Platform.
          • Privileges
          • Communication between Endpoint and Platform
          • Frameworks
        • Obtaining The EVE Agent
        • The E.V.E. Agent
          • Controls
          • Notifications
          • Isolation
        • Installing the EVE Agent
          • EVE Agent Installation on Windows EndPoints
          • Validating the Installation of EVE Agent on Windows
          • EVE Agent Installation on Linux Endpoints
          • Validating the Installation of EVE Agent on Linux
          • Backup of the Virtual Machine with Golden Image
        • Updating EVE Agent
        • Uninstalling the EVE Agent
        • Troubleshooting
          • Obtaining Logs of the Agent from the cloud instance
          • Obtaining Logs locally of the EVE Agent on Windows Systems
          • Obtaining Logs locally of the EVE Agent on Linux Systems
          • Obtaining Logs of the Isolation Process
      • Chapter 3: EVE Platform
        • Logging in to the Platform for the first time
        • Navigation Tabs
          • Dashboard
          • Emulation Control
            • Endpoints
              • Endpoints Table
              • Obtaining Endpoint Details
              • Rename an Endpoint: Alias
              • Restart an Agent
              • Emulation History of an Endpoint
              • Remove a Host
              • EVE Agent
              • Download the EVE Agent
              • Download Endpoints Report
              • Windows Installer Update
              • Linux Installer Update
              • Delete an Installer Version
            • Threat Library
              • View the MITRE Matrix Related to a Sample
              • Artifacts Severity
              • Artifacts
            • Emulations
              • Scheduled Emulations
              • Emulation Results
              • Export a .xlsx Report of an Emulation
              • Export a .PDF Report of an Emulation
              • Continuous Validation
            • Custom Threats
          • System Configuration
            • Users
              • Account Types
              • 2FA
              • SSO
        • License
        • Help
        • Support
        • Users Management
        • API
    • Data Usage Guide
      • Primer: How Epiphany Works
      • Data Sources: A Deeper Dive
      • Getting Results: Data Source Outputs
      • Data Privacy and Security
    • Epiphany Security and Trust
      • Introduction
      • Program Details
      • Primary Risks
      • Our Responsibility to You
      • Your Responsibility to Yourself
      • Supplemental Information
      • Secure by Design
      • Conclusion
  • Use Cases
    • Overview
    • 6 Essential Cybersecurity Questions
    • Validate and Manage Assets and Devices in Your Environment
    • Deep Inspection and Audit of Identity Services
    • Manage Exploitability
    • Manage Business Impact
    • Effectively Manage Attack Paths to Enable Better Risk Decisions
  • Epiphany Workflows
    • Technical Analysis
      • Create an Analysis-Focused Dashboard
        • Dashboard Widgets
        • Attack Path Widgets
        • Exposure Widgets
        • Occurrence Widgets
        • Environmental Widgets
        • Administrative Widgets
        • Ticketing Widgets
        • Example Analyst Dashboard
        • Report Features in Dashboard Widgets
      • Attack Path Management
        • Analyze the Attack Path
        • Select a Remediation Recommendation
        • Track Remediation Progress
        • View Potential Exposure to Material impact
        • Tag a Node
      • Vulnerability Management
        • Search for Vulnerabilities
        • Prioritize Vulnerabilities for Remediation
      • Identity Management
        • Identify Risky Conditions in Active Directory (Kerberoastable Users and AS-REP Roastable Users)
        • Identify Risky Conditions in Active Directory (Exposed Active Directory Domain Administrators)
        • Audit High Value Groups
      • Device Management
        • Explore Device Inventory
        • Identify a Rogue System
  • Site Collectors
    • Epiphany Collector Prerequisites
    • Site Collector Guide
      • Create a Site Collector in Epiphany
      • Download a Site Collector Image
      • Generate an Activation Key and Activate Your Epiphany Site Collector
      • Windows GPO Configuration for Epiphany Collector v2.0
      • (Deprecated) Windows GPO Configuration for Epiphany Collector
  • Data Sources
    • Azure Services
      • Obtain the Tenant ID in Azure
      • Register Epiphany as an Application in Azure
      • Add Permissions to the Application - Azure AD
      • Add Permissions to the Application - Defender for Endpoint
      • Add the Azure Credentials to Epiphany
      • How Epiphany Interacts With the Azure API
      • Supplemental Information
    • Carbon Black Cloud
      • Create a Role in Carbon Black Cloud
      • Create a New Carbon Black Cloud User
      • Generate a Carbon Black Cloud API Key
      • Add the Carbon Black Cloud Credentials to Epiphany
      • Supplemental Information
    • Cisco IOS
      • Create a New Cisco IOS User
      • Add the Cisco IOS Credentials to Epiphany
      • Supplemental Information
      • Cisco IOS Manual Collection
    • Claroty
      • Create a Claroty Read-Only User
      • Add the Claroty Credentials to Epiphany
      • How Epiphany Interacts With the Claroty API
    • CrowdStrike
      • Create a CrowdStrike API Key
      • Add the CrowdStrike Credentials to Epiphany
      • How Epiphany Interacts With the CrowdStrike API
      • Supplemental Information
    • Cylance
      • Create a New Cylance User
      • Add the User's Cylance Credentials to Epiphany
      • How Epiphany Interacts With the Cylance API
      • Supplemental Information
    • Manage Engine Patch Manager Plus
      • Create a New Patch Manager Plus User
      • Create a New Patch Manager Plus API Key
      • Add the Patch Manager Plus Credentials to Epiphany
      • How Epiphany Interacts With the Patch Manager Plus API
    • NCentral
      • Create an NCentral Read-Only User and an API Key
      • Add the NCentral Credentials to Epiphany
      • How Epiphany Interacts With the NCentral API
    • Nessus
    • Qualys
      • Create a New Qualys User
      • Add the Qualys Credentials to Epiphany
      • How Epiphany Interacts With the Qualys API
      • Supplemental Information
    • Rapid7 Nexpose
      • Create a New Rapid7 Nexpose User
      • Add the User's Credentials to Epiphany
      • Deploy an Epiphany Site Collector
      • Associate the Site Collector and the Data Source
      • How Epiphany Interacts With the Rapid7 Nexpose Data Source
      • Supplemental Information
    • SentinelOne
      • Create a New Sentinel One User and Generate an API Key
      • Add the User's Sentinel One Credentials and API Key to Epiphany
      • Supplemental Information
    • Tenable
      • Create a New Tenable User
      • Tenable IO Permissions
      • Generate an API Key
      • Add the User's Credentials to Epiphany
      • Deploy a Site Collector (Tenable.sc only)
      • Associate the Site Collector and the Data Source (Tenable.sc only)
      • How Epiphany Interacts With the Tenable Data Source
      • Supplemental Information
    • Trend Micro Apex One
      • Create a Trend Micro Apex One API Key
      • Add the Trend Micro Apex One Credentials to Epiphany
      • How Epiphany Interacts With the Apex Server
      • Supplemental Information
    • Trend Micro Cloud One Deep Security
      • Create a Trend Micro Cloud One Account and API Key
      • Add the Trend Micro Cloud One Credentials to Epiphany
      • How Epiphany Interacts With the Trend Micro Cloud One API
      • Supplemental Information
    • Vicarious vRx
      • Create an API key in Vicarious vRx
      • Add the Vicarious vRx API Key to Epiphany
    • Windows AD
      • Create an AD Service Account for Epiphany
      • Create the Windows AD GPO
      • Deploy the Epiphany Site Collector
      • Add the Windows AD Credentials to the Windows AD Data Source Configuration in Epiphany
      • Supplemental Information
  • Data Sources (Early Access)
    • Armis
      • Create a New Armis User
      • Generate an Armis API Key
      • Add the Armis User's Credentials to Epiphany
      • How Epiphany Interacts With the Armis API
      • Supplemental Information
    • ArubaOS
      • Use SSH to Collect ArubaOS Network Appliance Information
      • Add the ArubaOS Credentials to Epiphany
      • ArubaOS Manual Collection
      • Supplemental Information
    • Automox
      • Create a New Automox User and a New Automox API Key
      • Add the Automox Credentials to Epiphany
      • How Epiphany Interacts with the Automox API
      • Supplemental Information
    • AWS
      • Create a New AWS User and AWS API Credentials
      • Add the AWS Credentials to Epiphany
      • How Epiphany Interacts with the AWS API
      • Supplemental Information
    • BeyondTrust
      • Create an Explicit User Account in BeyondTrust
      • Deploy an Epiphany Site Collector
      • Add the BeyondTrust Credentials to Epiphany
      • Supplemental Information
    • Bloodhound
      • Bloodhound Set Up 1
      • Bloodhound Set Up 2
      • Add the Bloodhound Credentials to Epiphany
      • How Epiphany Interacts With the Bloodhound Data Source
      • Supplemental Information
    • Cisco Meraki
      • Generate a Read-Only Meraki Account
      • Generate a Meraki API Key
      • Collect the Meraki Network Maps
      • Add the Cisco Meraki Credentials to Epiphany
      • Supplemental Information
    • FortiOS
      • Generate a FortiOS API Token
      • Add the API Token to Epiphany
      • Supplemental Information
    • HPE Comware
      • Data Collection for Epiphany
      • Supplemental Information
    • Juniper OS
      • Configure and Verify the Rest API
      • Data Collection for Epiphany
      • Supplemental Information
    • Okta
      • Okta Set Up 1
      • Okta Set Up 2
      • Add the Okta Credentials to Epiphany
      • How Epiphany Interacts With the Okta Data Source
      • Supplemental Information
    • Palo Alto PAN-OS and Panorama
      • Create a New PAN-OS or Panorama User
      • Add the Panorama or PAN-OS Credentials to Epiphany
      • Add the SSH Credentials to Epiphany
      • PAN-OS and Panorama SSH/Manual Collection
      • How Epiphany Interacts With the Palo Alto API/Console
      • Supplemental Information
    • Windows AD (Legacy Version)
      • Create the Windows AD GPO
      • Supplemental Information
    • VMware vSphere
      • Create the vSphere User Account
      • Create a Role
      • Assign Read-Only permissions to vCenter
      • Assign a User Account the Role on a single Object
      • Add vSphere as a Data Source within the Console
  • Changelog
    • 2023-08-02: Phase 1 Customer Portal
    • 2023-08-25: Epiphany Administrator Guide v1.0
    • 2023-09-14: Product Update
    • 2023-09-27: Product Update
    • 2023-10-13: Product Update
    • 2023-12-01: Product Update
  • Legal Notice
    • Terms and Conditions
    • Privacy
Powered by GitBook
On this page
  • What is Attack Path Management?
  • Anatomy of an Attack Path
  • Traversing the Attack Path
  • The Foothold
  • The Relationship
  • The Objective
  • Managing Attack Paths
  • The Overall Path
  1. Epiphany Workflows
  2. Technical Analysis

Attack Path Management

Attackers use attack paths to access your valuable assets. Learn how Epiphany helps you manage your attack paths so you can keep your assets safe.

PreviousReport Features in Dashboard WidgetsNextAnalyze the Attack Path

Last updated 1 year ago

What is Attack Path Management?

Attack paths are the highways and paths attackers take to reach something of material value within your organization. Attackers do this using combinations of conditions ranging from exploitable vulnerabilities, to exposed identities, to misconfigured systems. To put it more plainly, it's the map to an impact that can occur if left exposed.

Attack path management is the science of reducing or eliminating the potential for material impact within your environment. By understanding how attackers can take advantage of your environment's exploitability, you can know where and how to take away their opportunities to cause harm. Attack path management is an important part of an overall exposure management approach.

Anatomy of an Attack Path

An attack path can be represented by many different devices, users, and relationships. The most basic attack paths include devices and users. This is what we think of when a device on the internet is exploited and an attacker gains access to a valuable user such as one with an administrator account. Epiphany is constantly evaluating, much like a very evil Google Maps, the best route an adversary could take to get to a destination (a "prize") at any time. When you break down these attack paths though, the pieces are fairly straight forward and are comprised of:

  • Devices. Any computer system capable of supporting an operating system.

  • User identities. A representation of a person or system that interacts with the authorization and authentication system.

  • Objectives. The reason an attacker would want to use a path (to reach a prize). You can think of this as something that would cause a material impact to your organization. In the basic attack path, the objective is an admin user.

  • Relationships. How the devices, identities, and objectives matter to each other. Example relationships are "what is installed on what" or "who is using what device."

Epiphany keeps track of many more types of objectives and relationships from your on-premises network equipment to your cloud assets. But the key is to understand these basics first.

Traversing the Attack Path

The Foothold

Attacks don't just suddenly appear in the environment and go from there. They take advantage of an exploitable condition to gain their foothold into the environment. To better illustrate this, it can be broken down into a few different representations: a direct exploitation attempt, a user exploitation attempt, and stolen credentials. They are described next.

Direct Exploitation Attempt

These types of attacks are easier to execute with devices on public Wi-Fi, shared office spaces, and homes of remote employees because these networks usually lack the protections provided within the corporate network. Consider how your users access your data and systems and how their devices are exposed.

User Exploitation Attempt

User exploitation attempts, called social engineering or in some cases arbitrary code execution, are centered around being able to convince a user to execute some dangerous code that is meant to exploit the operating system or application on the user's device. The first stage of a lot of ransomware, called the dropper, is usually benign but is used to download malicious code that will take advantage of known vulnerabilities.

The most common attack vectors for these types of attacks are phishing attacks through email that result in the user executing a trojan document such as a PDF, redirecting the user to a malicious site, or redirecting the user to a site to steal their credentials.

Stolen Credentials

Using stolen credentials is the exploitation equivalent of using the front door. Often ransomware groups and advanced persist threats (APT) will use credentials stolen through other breaches or social engineering attempts to log directly in your corporate VPN and work from there. The only meaningful way to protect against that is by using multi-factor authentication (MFA) to validate against a remote access system.

The Relationship

The relationship between the nodes within an environment is one of the most important parts of understanding the attack path. Epiphany uses these relationships to give you the ability to see why an attacker might want to use a relationship to carry out its attack. The implications of each relationship and the impact to the business is what Epiphany constantly thinks about. As you become familiar with the platform you will see the steps Epiphany takes to simplify this.

The illustration above shows some of the types of relationships Epiphany takes into account when building the attack paths you see within the platform. In this very basic example, there are multiple mechanisms for exploitation that Epiphany considers. The normal relationship in Epiphany is between a device and a user. Inside Epiphany, it is labeled with "Used By." This is to simplify the ability to read the path from left to right, but can actually be technically represented by the presence of a token, an active session, or a credential that could be used. Each of these mean different things to the attacker, its tools, and its objectives.

Epiphany also illustrates the relationship a group could have to the "Admin to" relationship of a device. In this case Epiphany uses the administrator and backup operator group from Windows Active Directory to show that an attacker may have different ways to access the objective device by using the user credential stolen earlier in the path.

Epiphany keeps track of many different relationships among multiple systems within a platform, including network management, identity management, vulnerability scanners, application inventories, patch managers, endpoint protection, and many more.

The Objective

The objective is the whole reason the attacker is going after your organization to begin with. Each group or automated malicious application has an objective. The key to defending your organization is to understand the material impact caused by an attack path. To think of it another way, what in your organization causes a five-alarm fire if it goes down? What applications, users, and devices support that?

Managing Attack Paths

Managing attack paths is all about understanding your potential exposure, which is a function of a threat's ability to take advantage of your organization's weaknesses to create a material impact. You could think of it like this:

f(exposure)=(threat,exploitability,consequence)f(exposure) = (threat, exploitability, consequence)f(exposure)=(threat,exploitability,consequence)

This can be described simplistically as follows: for every exploitable condition present that the adversary can use, multiply them and then multiple that by the number of critical applications, users, and systems those conditions can impact. This index, an exploitability index, can turn out to be quite a large number and seem somewhat overwhelming. This is where Epiphany simplifies the problem. Its engine spends all of its time understanding all the components that contribute to your organization's potential exposure and then ranks the most exploitable paths, from the adversary's perspective, first. This allows you to focus on the outcome you want to achieve, instead of analyzing the problem.

Using the skills described above, it is possible to understand the attack path and pick the most meaningful relationship to focus on. Managing the attack path is all about working backward from the problem.

The Overall Path

While the attack path in the next image looks intimidating, you can understand it if you apply the skills described above and understand that Epiphany is doing a lot of the heavy lifting for you.

The Objective

By going to the end of the attack path, you can see what Epiphany has automatically found as exposed and understand why it's important to the business. This is what Epiphany wants to stop the attacker from being able to reach. Notice the jewel icon in the upper right of the device icon. Epiphany uses the jewel to indicate that a device includes a "prize."

The Pivot

Pivot points are quite common in attack paths and usually occur because the attacker's objective is on the other side of the device or firewall. This could be access to a high-value account or a restricted network that gets the attacker to its objective.

The Attack Surface

The Remediation Recommendation

Once you've analyzed the path, pick the remediation strategy you think is best for your organization. Epiphany allows you to do multiple things with a remediation including creating tickets, assigning it for review, notifying on reoccurrence, or accepting the risk.

The Process

The process for managing attack paths built by Epiphany is very straight forward and can be repeated for different paths and variations in the same way.

  1. Finally, determine what fix you'd like to apply to the path to remediate it. Epiphany thinks the best course, by default, is to break the path. But this is not always practical for business operations. Sometimes you should also consider strategies for increasing your ability to monitor a high-risk situation or increase resistance to an attacker by changing defensive control settings.

In direct exploitation attempts, the attacker is trying to use a known vulnerability in an application or operating system to gain access (a "presence") to a device. This is the classic example that the basic attack path illustrated (above) and is what we most think of when we hear about something being exploited. These types of attacks are commonly used against firmware of internet-facing devices, such as the exploitation from 2021. This type of exploitation can also be used by ransomware to spread within a network using weaknesses in operating systems to exploit and install its malicious payload.

All attack paths can trace their access back to some point on the attack surface. This could be caused by a vulnerability, misconfiguration, or direct access such as with a stolen credential.

Epiphany has a built in "easy button" to take you to the relationship you should focus on first. Just click the anywhere you see it and it will display Epiphany's top recommendation list.

Find and understand how, if it were compromised, it might impact your business. Applications, devices, and users all have different values to a business. Keep this in mind as you proceed.

Look for a or other direct relationship to . This, for example, could be a misconfigured firewall or a user with special permissions. In the example path above, it is RICHARD.KLEINSCHMIDT@DEMO.EIP.IO that gives this access and the attacker gets it by using the HELPDESK_ADMINS@DEMO.EIP.IO account to access Richard's device.

Next, trace back to the beginning of the path. This is where the attack initially gains a foothold. If this is caused by a vulnerability, Epiphany will prioritize the vulnerabilities you should remediate using Epiphany's engine.

Pulse Connect Secure VPN
Vulnerability Management
foothold
the prize
pivot
the attack surface
Basic attack path.
A direct exploitation attempt.
A social engineering attempt.
A path with many avenues.
A complete attack path.
The "prize."
A pivot in an attack path.
Beginning of an attack path.
Epiphany's recommendation engine.