August 13

Webinar Takeaway: The Roundup by Wild West Hackin´ Fest: Red Team

0  comments

My key takeaways

  • Red is a component of blue
  • Blue can exist without red
  • Red cannot exist without blue
    • red w/o blue = criminal
  • Security Operations Design is often built on existing environment, rarely built from scratch
  • Threat definition: Risk = threat * vulnerability
    • alt: Threat = ThreatActor + Intent + Tool/Technique
    • Good intentions by intelligent people do not add up to understanding threats or how they operate
  • Getting pwnd most times isn't a one time event but a threat actor must follow a long series of events using multiple tools and techniques
  • The goal of security operations is to prevent, detect and respond to a threat-actor before they achieve their goal
    • binary "you've been hacked" vs not is not helpfull, as you loose sooner or later
  • A lot of time in blue teams is spend on getting in (exploit) but not so much on stay in (persistence) and act (operation impact)
  • Vulnerability assessments is an effort in attack surface reduction
  • Penetration Test is an effort in attack surface reduction
  • Threat based testing raises the threat success bar
    • prevent first, detect always
    • 100% prevention is not realistic
  • Start every engagement as a Security Assessment
    • Understand the problem set
    • Define goals
    • Determine what to measure
    • Label the engagement (if necessary)
  • You can only fight the way you practice -- Miyamoto Musahi

  • Cyber crime has increased 600% since COVID-19 Pandemic (according to Tyler Robinson, Dark Element)
  • If AV vendors look at all publicly available tools and detect them, it will make them look good on pentests
    • the bad guys have their own tools not publicly available
  • Inveigh is like responder if you don't have Python available
  • JS runs on M$ by default
  • Pentest: try to find as much as possible
    • Red Team Operations most times has a specific goal and are usually more sophisticated
    • Test your company vs your products

Env

additional links

User comments

  • covers — heute um 18:31 Uhr

    I've heard the analogy that the blue team is a knife and red is the whetstone. Red exists to make blue better so that when a real event occurs, blue is prepared and cuts through as quickly as possible

  • zer0cooL — heute um 18:39 Uhr

    "Without training, how can defenders be expected to protect against a theat?" Start with that question to the CISO...


Tags

C#, red teaming


You may also like

Boosting Cybersecurity in German SMEs with Gamification and Serious Play

TL;DR Gamified cybersecurity training offers an engaging and effective way to improve security awareness and practices within German SMEs. The ALARM Information Security project demonstrates the success of integrating gamification into training, enhancing retention and understanding of cybersecurity principles. By leveraging customized game scenarios, regular workshops, and participatory feedback loops, SMEs can bolster their cybersecurity

Read More

Unlock Effective Cybersecurity: Simplify Policies with the Clarity of the OSI Model

TL;DR Diving into the essence of effective cybersecurity, this article shines a light on the transformative power of simplifying policy language, inspired by the OSI model’s structured communication layers. It goes beyond theoretical insights, offering actionable strategies for CISOs to demystify complex jargon and make cybersecurity policies accessible and engaging for every team member. Highlighting

Read More