Live Adversary Simulation-Red and Blue Team Tactics
Live Adversary Simulation-Red and Blue Team Tactics
Stephen Sims
Security Researcher / Fellow / Curriculum Lead
SANS Institute
@Steph3nSims
#RSAC
Agenda
/2/
Intro
COMMON GOAL
/4/
What is “Adversary Emulation”?
/5/
Adversary Emulation
Exploitation
Delivery Installation
/6/
Why do Adversary Emulation?
/7/
Consider Purple Teaming
Red and Blue teams typically report within different silos or
hierarchies, hurting communication
vs
/8/
Feedback Loop
VULNERABILITY REPORT
/9/
Prerequisites for Purple Teaming
If you’re not looking, you can’t really purple team…
/ 10 /
How to Approach This?
Let's make blue more "red" and make "red" more blue:
Red team
• Understand prevention, detection and response
techniques
• Understand complexities and limitations of target
organization and tailor recommendations
• Present known TTPs to blue team (highlight "quick
wins") and innovate red team approach continuously
Blue team
• Understand and follow up on known adversary TTPs
• Test organization continuously and improve where
possible
• Track and report on coverage of TTPs (e.g. ATT&CK
framework)
/ 11 /
So how do we practically do this? What about our
yearly red team?
Does this mean "Purple" is better than "Red"? The answer is not that simple. Depending on
your objectives, either could offer value. Here's an idea for a setup:
Organize a yearly red team to assess the actual state of security in the
organization. Feedback only after the exercise ends, as the exercise is typically meant
to be stealth (realistic adversary emulation)…
RED
VALUE: Periodic assessment of organization resilience
/ 12 /
Demonstration
In 2017, a well-known organization fell victim to an attack
against a known Apache Struts2 vulnerability
Regardless of the lack of patching, the adversarial actions
performed were all recorded in the logs…
Let’s see a demo!
/ 13 /
What failed?
A lack of asset or software inventory (Critical Controls #1 & #2)
A lack of proper patch management
A lack of log management
A likely flat network
How does this map back to the various APT-Lifecycles available?
/ 14 /
…and it continues
/ 15 /
Tools
/ 17 /
APTSimulator
/ 18 /
FlightSim
/ 19 /
Atomic Red Team
/ 20 /
MITRE ATT&CK
MITRE ATT&CK “…is a globally-accessible knowledge base of
adversary tactics and techniques based on real-world
observations.”
/ 21 /
Caldera
/ 22 /
Caldera – Architecture
/ 23 /
Adversary Emulation Plans
Applying MITRE ATT&CK
/ 24 /
Adversary Emulation with Caldera
CALDERA is focused on adversary emulation “post compromise”.
As such, CALDERA assumes that an adversary already has an initial foothold on a network.
Tasklist
Dump PSExec
Caldera agent Localgroup PowerUp.ps1
credentials Pass-the-hash
admins
/ 25 /
Commercial Adversary Emulation Tools
/ 26 /
Demonstration
/ 28 /
Thanks!
Stephen Sims
@Steph3nSims