Normalization is the process used to organize data to reduce redundancy and improve data integrity. By filtering, tagging, and queuing data, Miley is effectively structuring the data to make it easier to store and share, which aligns with the goals of data normalization.
The needs of a Red Team typically include intelligence on the latest vulnerabilities, threat actors, and their tactics, techniques, and procedures (TTPs). This information is crucial for simulating realistic cyber attacks to test and improve an organization's defenses. Understanding current vulnerabilities and the methods used by threat actors allows the Red Team to accurately assess and enhance the security posture of the organization.
The stage Michael is currently in is 'Known knowns.' He has already gathered the information regarding the threats and is now analyzing and understanding the nature of those threats. In the context of cyber-threat intelligence, 'Known knowns' refers to threats that are identified and well understood.
The technique described involves a recursive DNS server logging responses from name server requests and storing this data in a central database for analysis. This method aligns with passive DNS monitoring, which uses such logs to analyze DNS communications for malicious activity. Therefore, data collection through passive DNS monitoring is the correct answer.
John is currently in the expansion phase of the advanced persistent threat lifecycle. This phase involves gaining further access to other systems in the network after obtaining initial access. By attempting to obtain administrative login credentials, John is trying to move laterally within the network, which is characteristic of this phase.