1+ from enum import Enum
2+
3+ class SecurityDomainsKeyWords (Enum ):
4+ ENDPOINT = ["lsass" , "registry" , "dll injection" , "kernel" , "winlogon" , "scheduled task" , "wmi" , "powershell" , "process injection" , "privilege escalation" , "credential dumping" , "rootkit" , "startup folder" , "service" , "bits jobs" , "removable media" , "hardware additions" , "browser extension" , "firmware" , "bootkit" , "master boot record" , "clipboard" , "screen capture" , "audio capture" , "video capture" , "disk wipe" , "ransomware" , "debugger evasion" , "sandbox evasion" , "trusted developer" , "xsl script" , "reflective code" , "access token" , "system binary proxy" , "local" ]
5+ NETWORK = ["lateral movement" , "packet sniff" , "port scan" , "man-in-the-middle" , "arp spoof" , "smb" , "rdp" , "dns tunnel" , "network share" , "c2" , "beacon" , "proxy" , "firewall" , "tcp" , "domain controller" , "kerberos" , "golden ticket" , "silver ticket" , "domain trust" , "active directory" , "ldap" , "ldap" , "netbios" , "network boundary" , "bgp hijack" , "bgp hijack" , "dns hijack" , "dhcp poison" , "forced authentication" , "remote service" , "network device" , "vlan hopping" , "protocol tunnel" , "traffic signaling" , "weaken encryption" , "exploitation remote" , "network" ]
6+ WEB_APP = ["web shell" , "csrf" , "file upload vulnerability" , "apache" , "nginx" , "iis" , "php" , "javascript" , "rest api" , "http" , "cookie" , "server-side request forgery" , "ssrf" , "xml external entity" , "xxe" , "deserialization" , "path traversal" , "local file inclusion" , "remote file inclusion" , "template injection" , "ssti" , "api abuse" , "drive-by compromise" , "browser exploit" , "forge web credential" , "web service" , "defacement" , "server software component" , "reverse proxy" , "cgi" , "webdav" , "session hijack" , "web server" ]
7+ EMAIL_INFILTRATION = ["spearphishing attachment" , "spearphishing link" , "phishing" , "malicious attachment" , "email account" , "outlook" , "exchange" , "smtp" , "mail server" , "macro" , "spoofing" , "social engineering" , "inbox rule" , "dkim" , "business email compromise" , "bec" , "email forwarding rule" , "email delegation" , "oauth consent" , "reply-to manipulation" , "email thread hijack" , "internal spearphishing" , "email collection" , "zimbra" , "mail client" , "mapi" , "email template" , "spoof sender" , "dmarc" , "spf" , "email gateway" , "office document" , "pdf attachment" , "link shortener" , "attachment" ]
8+ DATA_EXFILTRATION = ["exfiltrat" , "data staging" , "data compressed" , "steganography" , "covert channel" , "database dump" , "automated collection" , "sensitive data" , "intellectual property" , "data transfer" , "steal" , "archive" , "cloud storage exfil" , "ftp exfil" , "physical medium" , "air gap" , "qr code" , "scheduled transfer" , "size limit" , "chunk data" , "alternate protocol" , "icmp tunnel" , "dns exfiltration" , "automated exfiltration" , "web service exfil" , "pastebin" , "code repository" , "cloud account transfer" , "email exfil" , "data destruction" , "data encrypted" , "base64" , "hex encode" , "image steganography" , "upload" ]
9+ URL_FILTERING = ["domain fronting" , "url shorten" , "typosquatting" , "typosquatting" , "homograph" , "punycode" , "url reputation" , "content filter" , "web gateway" , "safe browsing" , "url categorization" , "blacklist bypass" , "whitelist" , "redirect" , "proxy bypass" , "dns over https" , "doh" , "dns over tls" , "dot" , "unicode domain" , "url encode" , "double encode" , "open redirect" , "referrer spoof" , "user agent spoof" , "captive portal" , "proxy pac" , "socks proxy" , "tor" , "vpn bypass" , "domain generation" , "fast flux" , "url confusion" , "subdomain takeover" , "url" ]
10+ CLOUD = ["aws" , "azure" , "gcp" , "lambda" , "s3 bucket" , "blob storage" , "kubernetes" , "docker" , "serverless" , "cloud instance" , "iam role" , "iam role" , "saas" , "tenant" , "subscription" , "api gateway" , "microservice" , "container" , "cloud trail" , "cloudtrail" , "cloud formation" , "terraform" , "cloud init" , "metadata service" , "instance metadata" , "cloud api" , "resource policy" , "cloud dashboard" , "unused region" , "snapshot" , "cloud backup" , "object storage" , "cloud function" , "service principal" , "managed identity" , "cloud key" , "sas token" , "assume role" , "virtual machine" ]
11+
12+ class SecurityDomains (Enum ):
13+ ENDPOINT = { "domain_name" : "Endpoint" , "domain_color" : "#389CFF" }
14+ NETWORK = { "domain_name" : "Network" , "domain_color" : "#009933" }
15+ WEB_APP = { "domain_name" : "Web App" , "domain_color" : "#FF9933" }
16+ EMAIL_INFILTRATION = { "domain_name" : "E-mail Infiltration" , "domain_color" : "#FF6666" }
17+ DATA_EXFILTRATION = { "domain_name" : "Data Exfiltration" , "domain_color" : "#9933CC" }
18+ URL_FILTERING = { "domain_name" : "Url Filtering" , "domain_color" : "#66CCFF" }
19+ CLOUD = { "domain_name" : "Cloud" , "domain_color" : "#9999CC" }
20+ TABLE_TOP = { "domain_name" : "Table Top" , "domain_color" : "#FFCC33" }
21+ UNCLASSIFIED = { "domain_name" : "Unclassified" , "domain_color" : "#969696" }
0 commit comments