Security Awareness

TryHackMe - Pyramid Of Pain Room

CSNP Team December 5, 2022
TryHackMe - Pyramid Of Pain Room

Learn about the Pyramid of Pain framework and how security professionals use it to understand the difficulty adversaries face when changing their attack indicators.

Content by Dan Rearden

The Pyramid of Pain is a well-renowned concept in cybersecurity, originally developed by security researcher David J. Bianco in 2013. This framework is being applied to cybersecurity solutions like Cisco Security, SentinelOne, and SOCRadar to improve the effectiveness of Cyber Threat Intelligence (CTI), threat hunting, and incident response exercises.

Understanding the Pyramid

The Pyramid of Pain describes the relationship between the types of indicators you might use to detect an adversary's activities and how much pain it will cause them when you deny those indicators. The pyramid has six levels, from bottom to top:

1. Hash Values (Trivial)

Hash values like MD5, SHA-1, and SHA-256 are unique identifiers for specific files. While useful for identifying known malware, they're trivial for attackers to change—simply modifying a single bit produces an entirely different hash.

  • Easy to detect known malware
  • Extremely easy for attackers to bypass
  • One small change = completely new hash

2. IP Addresses (Easy)

IP addresses are slightly more difficult to change than hashes, but attackers can easily switch to new infrastructure using cloud services, VPNs, or compromised systems.

  • Can block known malicious IPs
  • Attackers can rent new servers within minutes
  • Cloud services make IP rotation trivial

3. Domain Names (Simple)

Domain names require more effort to change than IPs. Attackers must register new domains, set up DNS, and potentially wait for propagation. However, cheap domain registration makes this only a minor inconvenience.

  • DNS-based blocking is effective short-term
  • Domain generation algorithms (DGAs) help attackers
  • New domains cost just a few dollars

4. Network/Host Artifacts (Annoying)

These are indicators like User-Agent strings, registry keys, specific file paths, or network protocol quirks. Changing these requires modifying tools, which takes real effort.

  • Requires tool modifications to change
  • Detection rules based on behavior patterns
  • More reliable than simple IOCs

5. Tools (Challenging)

When you can identify and block the actual tools an adversary uses, they must develop or acquire new tools. This significantly increases their cost and time investment.

  • Forcing tool changes disrupts operations
  • New tools require testing and refinement
  • May require entirely new infrastructure

6. TTPs - Tactics, Techniques, and Procedures (Tough!)

At the top of the pyramid are TTPs—the behaviors and methods adversaries use. Detecting and disrupting TTPs forces attackers to fundamentally change how they operate, which is extremely costly.

  • Behavioral detection is most effective
  • Forces complete operational changes
  • Requires significant adversary investment to overcome

Practical Application

Understanding the Pyramid of Pain helps security teams prioritize their detection efforts:

  1. Focus detection on higher levels - While hash-based detection has its place, investing in behavioral detection provides better long-term value
  2. Layer your defenses - Use indicators at all levels for defense in depth
  3. Track adversary adaptation - When attackers change tactics, document the new TTPs
  4. Measure defensive impact - Consider how much "pain" your detections cause

Integration with MITRE ATT&CK

The Pyramid of Pain complements the MITRE ATT&CK framework beautifully. While ATT&CK catalogs adversary techniques, the Pyramid helps prioritize which detections provide the most value.

Conclusion

The Pyramid of Pain reminds us that not all indicators are created equal. By focusing our detection efforts on TTPs and tools rather than easily-changed hash values, we can create more resilient defenses that truly impact adversary operations.


Was this article helpful?

Related Articles

How to Become a Penetration Tester with Zero Experience In Five Steps
Implementation Guides
CSNP Team March 25, 2024

How to Become a Penetration Tester with Zero Experience In Five Steps

A practical guide to starting your penetration testing career from scratch, covering essential skills, certifications, and strategies for breaking into the field.

Read more
Unraveling the Where: A Deep Dive into Geolocation (GEOINT) for OSINT
Implementation Guides
CSNP Team July 31, 2023

Unraveling the Where: A Deep Dive into Geolocation (GEOINT) for OSINT

Learn how to conduct geolocation analysis using OSINT techniques. Discover tools and methods for identifying locations from photos and videos.

Read more
TryHackMe Cyber Kill Chain
Security Awareness
CSNP Team April 17, 2023

TryHackMe Cyber Kill Chain

Learn about the Cyber Kill Chain framework developed by Lockheed Martin and how it helps security professionals understand and defend against cyber attacks.

Read more

Stay Updated

Subscribe to our newsletter for cybersecurity news and updates

We respect your privacy. Unsubscribe at any time.