11from enum import Enum
22
33class SecurityDomainsKeyWords (Enum ):
4- ENDPOINT = ["lsass" , "registry" , "dll injection" , "kernel" , "winlogon" , "scheduled task" , "wmi" , "powershell" , "process injection" , "privilege escalation" , " credential dumping" , "rootkit" , "startup folder" , "service" , " bits jobs" , "removable media" , "hardware additions" , "browser extension" , "firmware" , "bootkit" , "master boot record" , "clipboard" , "screen capture" , "audio capture" , "video capture" , "disk wipe" , "ransomware" , "debugger evasion" , "sandbox evasion" , "trusted developer" , "xsl script" , " reflective code" , "access token" , "system binary proxy" , "local " ]
5- NETWORK = ["lateral movement" , "packet sniff" , "port scan" , "man-in-the-middle" , "arp spoof" , "smb" , "rdp" , "dns tunnel" , "network share" , "c2" , "beacon" , "proxy" , " firewall" , "tcp" , " domain controller" , "kerberos" , "golden ticket" , "silver ticket" , "domain trust" , "active directory" , "ldap" , "ldap" , "netbios" , " network boundary" , "bgp hijack" , "bgp hijack" , "dns hijack" , "dhcp poison" , "forced authentication" , "remote service" , "network device" , "vlan hopping" , "protocol tunnel" , "traffic signaling" , "weaken encryption" , "exploitation remote" , "network " ]
6- WEB_APP = ["web shell" , "csrf" , "file upload vulnerability" , "apache" , "nginx" , "iis" , "php" , "javascript" , "rest api" , "http" , " cookie" , "server-side request forgery" , "ssrf" , "xml external entity" , "xxe" , "deserialization" , "path traversal" , "local file inclusion" , "remote file inclusion" , "template injection" , "ssti" , "api abuse" , "drive-by compromise" , "browser exploit" , "forge web credential" , "web service" , "defacement" , "server software component" , "reverse proxy" , "cgi" , " webdav" , "session hijack" , "web server " ]
7- EMAIL_INFILTRATION = ["spearphishing attachment" , "spearphishing link" , "phishing" , "malicious attachment" , "email account" , "outlook" , "exchange" , "smtp" , "mail server" , "macro" , "spoofing" , " social engineering" , "inbox rule" , "dkim" , "business email compromise" , "bec" , "email forwarding rule" , "email delegation" , "oauth consent" , "reply-to manipulation" , "email thread hijack" , "internal spearphishing" , "email collection" , "zimbra" , "mail client" , " mapi" , "email template" , "spoof sender" , "dmarc" , "spf" , "email gateway" , "office document" , "pdf attachment" , " link shortener" , "attachment " ]
8- DATA_EXFILTRATION = ["exfiltrat" , "data staging" , "data compressed" , "steganography" , "covert channel" , "database dump" , "automated collection" , "sensitive data" , " intellectual property" , "data transfer" , "steal" , "archive" , " cloud storage exfil" , "ftp exfil" , "physical medium" , "air gap" , "qr code" , " scheduled transfer" , "size limit" , "chunk data" , " alternate protocol" , "icmp tunnel" , "dns exfiltration" , "automated exfiltration" , "web service exfil" , "pastebin" , "code repository" , "cloud account transfer" , "email exfil" , "data destruction" , "data encrypted" , "base64" , "hex encode" , " image steganography" , "upload " ]
9- URL_FILTERING = ["domain fronting" , "url shorten" , "typosquatting" , "typosquatting" , "homograph" , "punycode" , "url reputation" , "content filter" , "web gateway" , "safe browsing" , "url categorization" , "blacklist bypass" , "whitelist" , "redirect" , "proxy bypass" , "dns over https" , "doh" , "dns over tls" , "dot" , "unicode domain" , "url encode" , "double encode" , "open redirect" , "referrer spoof" , "user agent spoof" , " captive portal" , "proxy pac" , "socks proxy" , "tor" , "vpn bypass" , "domain generation" , "fast flux" , "url confusion" , "subdomain takeover" , "url " ]
10- CLOUD = ["aws" , "azure" , "gcp" , "lambda" , "s3 bucket" , "blob storage" , "kubernetes" , "docker" , "serverless" , "cloud instance" , "iam role" , "iam role" , "saas" , "tenant" , "subscription" , "api gateway" , "microservice" , "container" , " cloud trail" , "cloudtrail" , "cloud formation" , "terraform" , "cloud init" , "metadata service" , "instance metadata" , "cloud api" , "resource policy" , "cloud dashboard" , "unused region" , "snapshot" , "cloud backup" , "object storage" , "cloud function" , "service principal" , "managed identity" , "cloud key" , "sas token" , "assume role" , "virtual machine " ]
4+ ENDPOINT = ["lsass" , "registry" , "dll injection" , "kernel" , "winlogon" , "scheduled task" , "wmi" , "powershell" , "process injection" , "credential dumping" , "rootkit" , "startup folder" , "bits jobs" , "removable media" , "hardware additions" , "browser extension" , "firmware" , "bootkit" , "master boot record" , "clipboard" , "screen capture" , "audio capture" , "video capture" , "disk wipe" , "ransomware" , "debugger evasion" , "sandbox evasion" , "reflective code" , "access token" , "system binary proxy" ]
5+ NETWORK = ["lateral movement" , "packet sniff" , "port scan" , "man-in-the-middle" , "arp spoof" , "smb" , "rdp" , "dns tunnel" , "network share" , "c2" , "beacon" , "firewall" , "domain controller" , "kerberos" , "golden ticket" , "silver ticket" , "domain trust" , "active directory" , "ldap" , "network boundary" , "bgp hijack" , "bgp hijack" , "dns hijack" , "dhcp poison" , "forced authentication" , "remote service" , "network device" , "vlan hopping" , "protocol tunnel" , "traffic signaling" , "weaken encryption" , "exploitation remote" ]
6+ WEB_APP = ["sql injection" , "cross-site script" , " web shell" , "csrf" , "file upload vulnerability" , "apache" , "nginx" , "iis" , "php" , "javascript" , "rest api" , "cookie" , "server-side request forgery" , "ssrf" , "xml external entity" , "xxe" , "deserialization" , "path traversal" , "local file inclusion" , "remote file inclusion" , "template injection" , "ssti" , "api abuse" , "drive-by compromise" , "browser exploit" , "forge web credential" , "web service" , "defacement" , "server software component" , "reverse proxy" , "webdav" , "session hijack" ]
7+ EMAIL_INFILTRATION = ["spearphishing attachment" , "spearphishing link" , "phishing" , "malicious attachment" , "email account" , "outlook" , "exchange" , "smtp" , "mail server" , "social engineering" , "inbox rule" , "dkim" , "business email compromise" , "bec" , "email forwarding rule" , "email delegation" , "oauth consent" , "reply-to manipulation" , "email thread hijack" , "internal spearphishing" , "email collection" , "zimbra" , "mapi" , "email template" , "spoof sender" , "dmarc" , "spf" , "email gateway" , "link shortener" ]
8+ DATA_EXFILTRATION = ["exfiltrat" , "data staging" , "data compressed" , "steganography" , "covert channel" , "database dump" , "automated collection" , "intellectual property" , "cloud storage exfil" , "ftp exfil" , "physical medium" , "air gap" , "scheduled transfer" , "alternate protocol" , "icmp tunnel" , "dns exfiltration" , "automated exfiltration" , "web service exfil" , "pastebin" , "code repository" , "cloud account transfer" , "email exfil" , "data destruction" , "data encrypted" , "image steganography" ]
9+ URL_FILTERING = ["domain fronting" , "url shorten" , "typosquatting" , "typosquatting" , "homograph" , "punycode" , "url reputation" , "content filter" , "web gateway" , "safe browsing" , "url categorization" , "blacklist bypass" , "whitelist" , "redirect" , "proxy bypass" , "dns over https" , "doh" , "dns over tls" , "dot" , "unicode domain" , "url encode" , "double encode" , "open redirect" , "captive portal" , "proxy pac" , "socks proxy" , "tor" , "vpn bypass" , "domain generation" , "fast flux" , "url confusion" , "subdomain takeover" ]
10+ CLOUD = ["aws" , "azure" , "gcp" , "lambda" , "s3 bucket" , "blob storage" , "kubernetes" , "docker" , "serverless" , "cloud instance" , "iam role" , "iam role" , "saas" , "tenant" , "subscription" , "api gateway" , "microservice" , "cloud trail" , "cloudtrail" , "cloud formation" , "terraform" , "cloud init" , "metadata service" , "instance metadata" , "cloud api" , "resource policy" , "cloud dashboard" , "unused region" , "snapshot" , "cloud backup" , "object storage" , "cloud function" , "service principal" , "managed identity" , "cloud key" , "sas token" , "assume role" ]
1111
1212class SecurityDomains (Enum ):
1313 ENDPOINT = { "domain_name" : "Endpoint" , "domain_color" : "#389CFF" }
@@ -18,4 +18,4 @@ class SecurityDomains(Enum):
1818 URL_FILTERING = { "domain_name" : "Url Filtering" , "domain_color" : "#66CCFF" }
1919 CLOUD = { "domain_name" : "Cloud" , "domain_color" : "#9999CC" }
2020 TABLE_TOP = { "domain_name" : "Table Top" , "domain_color" : "#FFCC33" }
21- UNCLASSIFIED = { "domain_name" : "Unclassified " , "domain_color" : "#969696 " }
21+ TOCLASSIFY = { "domain_name" : "To classify " , "domain_color" : "#FFFFFF " }
0 commit comments