# Working with attack narratives

The goal of the Attack Narrative is to educate you on the impact of the vulnerabilities that our Agents found so that it's clear how the exploits were used together to achieve the objective. For example, we identified three vulnerabilities and, in this order, we were able to access your credit card information or your healthcare data, etc.

Attack narratives are the result of NetSPI Agents exploiting any found vulnerabilities to gain access to an application, a system, or some kind of sensitive data. If they get onto a system, they do secondary reconnaissance to allow them to find addition repositories that allows them to pivot from th eInternet to inside your network, whether cloud or on premises. They will exploit a series of vulnerabilities to get to their objective. Each major phase is presented as a step in the Attack Narrative view.

All that data was already in the Platform. With the Attack Narrative, we've created an interface that allows our NetSPI Agents to build these stories visually and to enforce some consistency (for NetSPI Agents) so that the way these stories are told is the same, no matter the Agent.

# Accessing the attack narrative

Attack narratives are accessed by engagement.

  1. Hover over PTaaS in the left navigation, and select Engagements to display the Engagements page.

  2. Select any engagement row to display its Engagement Details page.

  3. Select the Attack Narrative tab to display the Attack Narratives table with all the attack narratives for that engagement.

    Attack Narrative Table

  4. Select an Attack Narrative table row to display an attack narrative.

    Attack Narrative Step View

  5. Use the lower left controls Item One to zoom in, zoom out, fit the narrative to optimal viewing on the page, and toggle the attack narrative view on or off.

    Attack Narrative Controls

  6. Use the top Attack Narrative controls Item Twoto change the view.

    Attack Narrative Views

Views (left to right in image above) include step view, map view, timeline view, and MITRE Att&ck view. Each of these views is detailed below. On all possible attack narrative views, you are able to select an asset or finding to view its details.

For example:

  • For an asset, you will view Asset details and what findings are associated with that asset.
  • For a finding, you can select the finding in the attack narrative to view details such as severity, remediation instructions, MITRE Att&ck information, etc.

# Step view

The step view shows you each step the NetSPI Agent took to accomplish the objective. What differentiates one step from the next is the perimeter. A threshold is established between two assets or two environments. Moving from an application to a GitHub account (a SaaS provider), for example. This illustrates a clear line between the application compromise and the SaaS compromise and how they relate to each other.

Attack Narrative Step View
Attack Narrative Step View

The steps help the NetSPI Agent conceptualize each of these phases, but also help you, in the NetSPI Platform, to understand the initial vulnerabilities that were able to be exploited and what came after (the dependencies for escalation).

In many cases fixing step one may stop the flow from left to right for example (remediation). The step view reflects some order of priority when you go to fix these problems. The far left step is the biggest priority and the steps further to the right are lower in priority.

# Map view

In map view, the focus is on which zones the assets are contained in and how the NetSPI Agent traverses through those zones. The map view is perfect for a higher level audience, who may need to understand: how bad is it and where are the problems?

Attack Narrative Map View
Attack Narrative Map View

The map view shows anything in red can be considered "really bad"; something that needs to be fixed right away. Other items are color coded to severity to get a rough feeling for where your worst issues are and which order to fix them.

The arrows show how an attacker would traverse the environments and in which order. It all starts with the external perimeter, flows next to the SaaS provider (in the example above), then flows into the cloud environment, to the internal environment, and then back into the SaaS environment. We show we were able to compromise the majority of your assets through this escalation chain.

# Timeline view

The Timeline view focuses more on the findings themselves. It is the only view to display findings information when you select items in the view.

Attack Narrative Timeline View
Attack Narrative Timeline View

The timeline view maps out the events (a finding), when it took place, and how long it took for that to take place.

For example, it answers:

  • Why did it take NetSPI so long to do this?
  • What was the NetSPI Agent doing during this time to find this attack narrative?
  • How the steps to discover the finding break down, time spent on each step, what the Agent was doing and how they flowed throughout this attack narrative process step by step with durations.

Red team engagements especially get a lot of value from the timeline view. Generally, the timeline view provides some time context for standard penetration tests or during red team engagements. In red team engagements, the Agent's goal is to break in and accomplish an objective without anybody knowing we ever did it. Only a few people in your organization are notified when they do.

The timeline view allows you to go back to your security operations team, who monitors and responds to security events in the environment, and paints them a picture of what the NetSPI Agent did, but also when they did it so that your SOC team can break down their event logs and evaluate where the near misses occurred so they can improve. Your security operations team can dig into all these things and get asset data where they need to.

# MITRE Att&ck view

The MITRE Att&ck view breaks down both assets and findings into their MITRE tactics (shown at the top of the image below).

Attack Narrative MITRE Att&ck View
Attack Narrative MITRE Att&ck View

Seeing where things happen in the MITRE flow can be helpful to understanding a vulnerability and the remediation needed.

When viewing the MITRE tactics (Initial Access, Execution, etc.) consider that MITRE Att&ck as a whole covers three big buckets: tactics, techniques, and procedures.

# Tactics

The tactics (Initial Access, Execution, etc.) represent the "why". "Why am I taking this action as an attacker? Am I taking action to gain initial access? To escalate privileges? To move laterally or exfiltrate data?"

# Techniques and Procedures

The individual techniques, which are represented by the findings that you see in the steps in the MITRE Att&ck view, could be vulnerabilities, malicious actions, etc. These items fall into the technique bucket or the "how", both generally and specifically (e.g., I ran this exact command).

# Timeline

On the right of the MITRE Att&ck view, the Timeline displays to provide additional context. This illustrates and confirms that NetSPI performed this action.