Jasper Alblas
Jasper Alblas
Welcome to this walkthrough of the Diamond Model Room on TryHackMe. We will learn about the four core features of the Diamond Model of Intrusion Analysis: adversary, infrastructure, capability, and victim.
This room is part of the SOC Level 1 Path.
Room URL: https://tryhackme.com/r/room/diamondmodelrmuwwg42
I am making these walkthroughs to keep myself motivated to learn cyber security, and ensure that I remember the knowledge gained by these challenges on HTB and THM. Join me on learning cyber security. I will try and explain concepts as I go, to differentiate myself from other walkthroughs.
Now, let’s move on!
This task introduces the room. In this room, we will be introduced to the Diamond Model.
The Diamond Model of Intrusion Analysis is a cybersecurity framework developed by Sergio Caltagirone, Andrew Pendergast, and Christopher Betz in 2013. It provides a structured approach for understanding, analyzing, and communicating about cyber intrusion events.
The model is built around four core features, represented as nodes of a diamond:
Adversary:
The model is called the Diamond Model because these four features are edge-connected in a way that forms the shape of a diamond. The connections emphasize the relationships and dependencies between the features.
The Diamond Model includes axes that provide context for the relationships:
Answer: No answer needed
One of the core features of the diamond model is the Adversary.
An adversary is the person or group behind a cyberattack, also known as an attacker, hacker, or cyber threat actor. They are responsible for using tools and techniques (capabilities) to achieve their goals, such as stealing data or causing disruption.
Types of Adversaries:
Challenges in Identification:
Importance of Understanding Adversaries:
As discussed earlier, the term for a person/group that has the intention to perform malicious actions against cyber resources is Adversary Operator.
Answer: Adversary Operator
The person that benefits from the cyber attacks is called the Adversary Customer.
Answer: Adversary Customer
A victim is the target of a cyberattack. This can be an organization, individual, email address, IP address, domain, or other target.
Every cyberattack involves a victim, as attackers need a foothold to achieve their goals.
Victim Personae: The people or organizations being targeted, such as specific individuals, industries, or job roles.
Victim Assets: The systems, networks, email accounts, or other parts of the attack surface the adversary targets.
In IT we could describe software or hardware as an asset.
Answer: Victim Personae
Capability refers to the skills, tools, and techniques an adversary uses during an attack. It showcases their tactics, techniques, and procedures (TTPs).
Components:
The tools or capabilities belonging to an adversary are called the adversary arsenal.
Answer: Adversary Arsenal
Cybersecurity infrastructure refers to the physical and logical components adversaries use to execute and maintain malicious activities, such as command and control (C2) systems, data exfiltration, IP addresses, domain names, email accounts, or even malicious devices like USB drives.
Service Providers (e.g., ISPs, domain registrars, webmail providers) enable the functionality of both types, often unknowingly supporting adversarial operations.
Malicious domains and comprimised email accounts are controlled by intermediaries, so they are part of Type 2 Infrastructure.
Answer: Type 2 Infrastructure
Type 1 Infrastructure is directly controlled by the adversary.
Answer: Type 1 Infrastructure
The Diamond Model can include six meta-features that provide valuable context for analyzing intrusion events:
These meta-features enhance the Diamond Model’s ability to organize and interpret intrusion events systematically. I like to think that it adds metadata to an event.
This is a part of the phase feature, which covers which stage of the attack the attack is in.
Answer: Privilege Escalation
Not much to explain here 🙂
Answer: Result
It literally says “resources” in the question, so the answer is the same.
Answer: Resources
The Social-Political Component refers to the motivations and goals driving the adversary’s actions, such as:
This component emphasizes the “why” behind an attack and links the adversary’s goals with their actions.
Answer: No answer needed.
The Technology Component focuses on the relationship between two core features: Capability and Infrastructure. It explains how the adversary uses their tools, techniques, and infrastructure to operate and communicate effectively during an attack.
A watering-hole attack showcases this relationship. In this attack, the adversary compromises legitimate websites that they expect their target victims to visit. The Capability includes the tools or malware used to exploit the site, while the Infrastructure is the compromised website itself, serving as a delivery mechanism for the attack.
This component helps us understand the technical methods and resources an adversary leverages to achieve their goals.
Answer: No answer needed.
Are you ready to construct the Diamond Model? Please, deploy the static site attached to this task and dive into the case study and extract the information needed to populate our Diamond Model.
(Please note: The case study for this room occurred in 2015, and is not in light of recent developments in Ukraine).
Ensure you have deployed the static site attached to this task. To complete the static site, you will need to click on each triangular section of the diamond until you have completed all eight areas of the diamond.
We are met by the image of a diamond. Let’s go through all of the statements from each area.
I will start with the upperleft small triangle, and will move clockwise from there.
Answer: Adversary
Answer: Timestamp
Answer: Victim
Answer: Resources
Answer: Result
I picked the wrong one first, but the used tools are a part of the Capability component.
Answer: Capability
This question is more about the method used in the attack, and thus a part of the methodology meta-feature.
Answer: Methodology
It asks what “Cyber Kill Chain”, so the only answer can be Lockheed Martin’s Cyber Kill Chain. Otherwise the Unified Kill Chain could also have worked.
Answer: Lockheed Martin’s Cyber Kill Chain
Now we can see the flag. Well done!
Answer: THM{DIAMOND_MODEL_ATTACK_CHAIN}
We are done! I hope you learned a lot about this theoretical model, which can be used to disrupt threat activities, as well as communicate threats to stakeholders.
With this in your arsenal, you will have opportunities to leverage real-time intelligence for network defence and predict adversary operations.
Answer: No answer needed
Another great theoretical model understood. Great job on following along. Happy hacking!
Read more of my walkthroughs here.
You are welcome to comment on this post, and please do share with friends.
I would be even more grateful if you support me by buying me a cup of coffee:
I learned a lot through HackTheBox’s Academy. If you want to sign up, you can get extra cubes, and support me in the process, if you use the following link:
https://referral.hackthebox.com/mzwwXlg