Commands
Protocol Meaning
Types of Attacks
Types of Attackers
Frameworks
100

Shows the contents of a directory

ls

100

Protocol powers the World Wide Web using encryption

HyperText Transfer Protocol Secure (HTTPS)

100

Use of digital communications to trick people into revealing sensitive data or deploying malicious software

Phishing

100

Have significant expertise accessing an organization's network without authorization and can remain undetected for an extended period of time.

APT

100

Provides guidelines for organizations to identify, protect, detect, respond to, and recover from cyber attacks.

NIST - National Institute of Standards and Technology

200

Display current username.

whoami

200

 Means of logging in to a system using a visual desktop interface

RDP

200

Using a wrong domain name, or a mistyped domain name.  

EX. Goggle instead of Google

TypoSquatting

200

government intelligence agencies

State actors

200

Framework that requires healthcare organizations to implement controls for securing and protecting the privacy of electronic health information.

HIPPA

300

Command to change file permissions

chmod

300

A file-sharing application built on a client-server model, meaning you can download files from a central location

FTP

300

Targeting a specific victim/ group of users

Spear Phishing

300

Threat actors that are driven by a political agenda

Hacktivists

300

Cybersecurity framework that protects federal government information and systems against cyber threats

FISMA - The Federal Information Security Management Act

400

Display active processes

ps

400

Used to transmit and route email from the sender to the recipient’s address

SMTP- Simple Mail Transfer Protocol (SMTP)

400

Malware that is triggered by some event and destroys everything, including itself

Logic Bomb

400

Threat to an organization's security or data that comes from within

Insider Threats

400

Protect customers' payment card data.

PCI-DSS -  Payment Card Industry Data Security Standard

500

Direct download files from the internet

wget

500

Protocol is used to securely login to systems via a text-based interface for management

SSH

500

Where the pointer points to nothing. In doing so, the application crashes, debug information displayed , a type of DoS attack.

Null pointer Dereference

500

Computer hacker who violates laws or ethical standards

Black Hat Hacker

500

Designed to help those in the utility and power sector reduce cyber risk and ensure the reliability of bulk electric systems

NERC-CIP -  North American Electric Reliability Corporation - Critical Infrastructure Protection