← All talks

Operationalizing Purple Team

BSides SATX · 202150:5668 viewsPublished 2021-06Watch on YouTube ↗
Speakers
Tags
CategoryTechnical
TeamPurple
StyleTalk
About this talk
Title: Operationalizing Purple Team Presenters: Jorge Orchilles Track: In The Clouds Time: 1600 Virtual BSides San Antonio 2021 June 12th, San Antonio, Texas Abstract: This talk picks up after your first successful Purple Team Exercise is complete and teaches you how to continue maturing and improving your security program by operationalizing the collaboration between your security teams (Cyber Threat Intelligence, Red Team, and Blue Team). From testing new TTPs to Detection Engineering and showing value. Congratulations, you recently completed a successful, high-value Purple Team Exercise in your organization! Your Cyber Threat Intelligence team identified an adversary that has the capability, internet, and opportunity to attack your organization and provided those adversary behaviors to the red team. The red team emulated those same tactics, techniques, and procedures (TTPs) in your production environment while the Blue Team watched and learned how the attack works. Then the blue team showed everyone how they identify those adversary behaviors and follow their response process to quickly mitigate the threat. All your security teams collaborated and efficiently tested, measured, and improved your people, process, and technology! A month has passed, what happens next? This talk picks up after your first successful Purple Team Exercise is complete and teaches you how to continue maturing and improving your security program by operationalizing the collaboration between your security teams (Cyber Threat Intelligence, Red Team, and Blue Team). You don’t have to wait for the next scheduled, formal exercise to continue testing your people, process, and technology. You can leverage new Cyber Threat Intelligence and collaborate with your team to test new TTPs through a process called Detection Engineering. Speaker Bios: Jorge Orchilles is the Chief Technology Officer of SCYTHE and co-creator of the C2 Matrix project and author of the Purple Team Exercise Framework. He is a SANS Certified Instructor and the author of Security 564: Red Team Exercises and Adversary Emulation. He was a founding member of MITRE Engenuity Center of Threat-Informed Defense. He is a Fellow at the Information Systems Security Association (ISSA) and National Security Institute. Prior, Jorge led the offensive security team at Citi for over 10 years. ‍ He also co-authored Common Vulnerability Scoring System (CVSS) and A Framework for the Regulatory Use of Penetration Testing in the Financial Services Industry, and author of Microsoft Windows 7 Administrator’s Reference. Jorge holds post-graduate degrees from Stanford and Florida International University in Advanced Computer Security & Master of Science. Jorge speaks English, Spanish, and Portuguese, in decreasing levels of fluency.
Show transcript [en]

all right good morning besides i hope everyone is having a fantastic day uh today this morning and this session we have george ortiz he is the cto of scythe and he's going to talk to us about operationalizing purple team so thanks for joining us and i'm going to hand it over to you thank you so much pablo and hello everyone good morning oh look at that jake cran is here i see cena uh aka cheerio hello hello hello what a pleasure to be here thank you to besides and the organizers for putting this together it's so much work to run a conference we really appreciate it and thank you all for coming that's a new talk i've put together so

um as we go through it please give me feedback i can see the chat so i already saw uh the first question there coming in from cena so that always makes me smile and i'm also watching the discord this is fully live uh so if you have questions post them and am looking forward to your feedback because whenever we release new stuff we want to hear from you see if you found it valuable see if you're using it and of course how we can improve so today's talk is about operationalizing the purple team i've spent the last about year year and a half talking about purple team exercises and bringing value and a lot of

organizations have done this they ran their first exercise which is awesome but then i get the question what now do we just wait and do another exercise or what do we do and that is what i want to talk to you about today thank you again for that brief introduction pablo my name is georgia ortiz i am the chief technology officer at scythe we are an organization a startup that builds an adversarial emulation platform when we love purple teaming so been there exactly one year now believe it or not anyone that's following me on twitter and saw all that uh go down um also love contributing and giving back to the community author and contributor

to the purple team exercise framework the c2 matrix spent 10 years in corporate america running the offensive security team at citigroup and i also teach at sans i'm actually teaching right now believe it or not today's day six of security 504 so it's the ctf day thankfully i have a awesome uh ta there watching uh what's going on and hopefully i don't miss too much but i'm here with you now very excited and let's just get to it right so one of the big things that we are talking about today is attack detect and respond right working together to improve and evolve as the industry involves i mean we've all seen this happen right if you're new

to infosec welcome you're coming at a at a very interesting time where we're seeing humongous impact of these attacks all over the place right uh when the dry cleaner or uber driver knows about a ransomware attack that occurred at colonial or jbs and they know that you're an infosec they're like what are you doing how are we going to help this right so i'm really big on leveraging threat intelligence right understanding attack vectors how are these attacks happening building from that cyber threat intelligence making it actionable and then attacking ourselves i've been doing 10 years of offensive security uh at an organization and we bring value right because we are improving we are trying to stay a

step ahead of the attackers and fix and hopefully detect and respond much quicker before we are impacted and of course to do all that we have to track our work long gone are the days where we all worked in little silos writing o days you know full disclosure days are over etc we are all working together and that's what we're going to talk about here so what does an infosec team look like today well um if you're wondering about these unicorns these are the scythe unicorns they are awesome um what we do is we have cti teams right many organizations have cyber threat intel teams right and they spend a time going through and understanding attacks

grabbing indicators of compromise grabbing attack behaviors and they want their work to be actionable by various teams we also have the red team that works across the organization finding uh vulnerabilities and uh emulating behaviors that might or might not work in the organization essentially they're attacking it before the malicious actors do and then we have the blue teams the blue teams are our defenders right they have a tough job they're working in the security operations center they're hunt teaming they are doing uh defer digital forensics and instant response and they're in charge of making sure that if there is an attack that they respond to it and what we've been doing is bringing them together right not

operating in silos working together in a purple team and we started doing purple teaming and introducing purple teaming as a virtual team it's a slide i've used before and now i'm putting quotes around a purple team is a virtual team where the following teams work together cyber threat intelligence does the research understands ttps provides them to the red and the blue team the red team is in charge of emulating those ttps the blue team is in charge of ensuring they have detection and that they know how to respond to those behaviors so through that we publish the purple team exercise framework as you can see there on the right starts with cyber threat intelligence there's a lot of preparation because we

want the most efficient use of your time when we bring everyone together to sit through an exercise we want it all to function right so lots of planning goes on making sure we have target systems target accounts we're going to hit make sure we have an adversary emulation plan make sure there's an exercise coordinator attendees etc then we run the exercise we see and learn what is working what is not working and of course we have lessons learned so if you've never heard of a purple team exercise i'm going to level you up very quickly as we get into the next steps so in an exercise you have an exercise coordinator they present an adversary that is likely to target your

organization they present ttps tactics techniques and procedures those behaviors and the technical details about it then you all work together the red the blue the cti teams the attendees really interesting when you have senior management attendees because you bring up a ttp let's say downloading an iso from the internet what are the expected controls and one might say that's blocked we want to allow that what about um download or emailing an iso no that's definitely blocked or no they'll be caught by our proxy or that will be this right you have that discussion you set expectations red team then takes that ttp and emulates it does goes through and shows it on the screen a learning opportunity for everyone

there how do attacks work you're actually seeing it red team isn't working on their own over there in the corner and then giving you a report of things that work no they're showing it to you then the blue team after seeing that attack goes through and they follow their process they look to see if there were any alerts there was something that was logged here or there and they share their screens again another learning opportunity this time for the red team to see how the blue team functions and then if something didn't meet expectations or there are opportunities to improve we do detection engineering this is where you enable security controls maybe enable a log

or maybe a log was already there but there was no alert you tune that you want the alert to happen when the malicious activity occurs but not when regular activity occurs and then you repeat this throughout that day or that week however long your exercise is and of course you show value right you track all of this you track the ttps and these ttps are no longer something that is open or closed right those are vulnerabilities a vulnerability is patched or it's not patched it was exploited or wasn't exploited right open close very simple with ttps we are doing behaviors that users can do so sure there's some blocked behaviors but really what you need is for them to be

logged and alerted sometimes you have no evidence so you want to track this the image on the left comes from uh one of our partners plex truck which is a reporting solution tracking ttps no longer has open close but actually as alerted and logged or not logged or blocked and then on the right you have vector vector is a free tool that allows you also to track ttps and shows you uh how you improve over time so that is a 10 minute or less intro to purple team exercises if you want to learn more about purple team exercises we have the purple team uh exercise framework it's free you can download it um and we're actually working on version

two so we've learned a lot running purple team exercises from the consultant perspective because we go companies say hey purple teaming looks awesome i've never done it i don't know where to start i read the framework but can you help us and yes we of course can help you so if you're interested in stuff definitely let us know hit me up outside of this talk but if you want to do this on your own download this framework and uh check it out so great intros over we finished our first exercise high fives virtual double high five for all of you what now well now we need to operationalize this right we can do purple team exercises

maybe once a month once every two months once every three months etc right periodically but we know that we're gonna get new ttps discovered we're gonna see new attacks and what do we do with all that other time right the red team goes and works in their silo again the blue team goes and works in their silo cti ghostworks in their silo no we want them to continually work together one exercise is great but to get that collaboration it can't just be ad hoc so we are going to operationalize that and that is what we're going to talk about today if you already have operationalized purple teaming that is awesome where do we see this

going dedicated purple team as a group of people that have experience with cyber threat intelligence with attack and with detection and response and they work together understanding threats and detections it's a very tough job you need experience but through using a very simple step like i've just shown here going from a purple team exercise to operationalize to dedicated you can get there too so our focus today for this talk is how do we operationalize purple teaming as virtual teams working together so we built a new cycle the cycle starts when new cti or ttps are identified and anyone can do this it could be the cyber threat intelligence team that just read something new because they read

every cti report out there they're on top of all of these attacks it could be the red team the red team should be focusing on finding new ways to do things the red team should not be repeating ttps over and over because you can automate that the red team should be building new and finding new ways of doing attacks or the blue team might have found something they're going through their day-to-day and they see maybe the hunt team sees something hmm this is interesting i haven't seen this attack before anyone can provide and initiate this process right cdti red and blue working together you send this out hey check this out brand new cti let's review it then you assign a cti

member a red team member a blue team member to work together then over on the right step two we are going to analyze and organize these ttps if it was a full attack then we want to map that attack to miter attack we want to correlate with previous test cases are these really new ttps that we've never tested before or have we tested it maybe it's a new procedure is it the same procedure if it's the same procedure and we feel we have coverage we can verify that and your process can be over and for the short term but if it's new then we need to have a tabletop discussion this is how this attack works according

to the cti what is our expected detection response you have that conversation for the various ttps the red team will then understand the threat and emulate the attack one of the things i'll show you all the way at the end is a purple team maturity model that covers deployment integration and creation as you mature through it but the point here is the red team will emulate this attack while the blue team watches then the blue team will understand what detections they have they will see if they need to create something new if they need to integrate something deploy something and then repeat this once you do build out this new control new method of finding

something then you'll have to repeat that same ttp while you train your people right sock analysts right so far we've only had three or four people working together we want to inform the greater team let everyone in cti know about this new cti and how it currently affects the organization let everyone on the red team know this new attack method so that they add it to their library and add it to their automation and then the blue team knows about this attack knows that if they get an alert what to do about it so that is what we're gonna go through here and if you've ever gone to my talks you know i like being very practical

so let's get to it step one new cyber threat intelligence comes in right in this case cti read this new email this new blog post from microsoft's threat intelligence center a new sophisticated email based attack from nobelium cti team reads this says huh it's interesting let me share this with our virtual purple team email goes out or you do it through a ticketing system a tracking system wherever you can implement this i've seen it done in jira i've seen it done in archer we can do it on a number of different places the point is notify the virtual uh purple team let them know hey microsoft thursday this one was thursday afternoon uh their second one was on friday

afternoon right before memorial day right always comes in at that time right we can't get something on i don't know a monday afternoon no it always has to drop at the end of the week right so we assign whether it's self-assigned or manager assigned be like oh this looks cool i'll take it i'll be the red teamer that's going to take it the blue teamer says all right i'll take this one and of course the cti person that found this will be involved so what do we have we are going to initiate our purple team [Music] [Music] just sorry i couldn't keep a straight face on that one so a little comic relief there we get together now we need to do step

two analyze and organize these ttps what did we see well we have to read through this dense cti report we need to extract the ttps we need to map them to miter attack and then we need to correlate with previous tests so let's take a look if you haven't heard of this attack this was uh microsoft found this essentially uh this group this threat actor compromised the constant contact of usaid usaid is a legitimate organization constant contact is a legitimate email sending provider they are used to sending newsletters and emails to people that subscribe so you people that were interested in usa have subscribed to usaid they are receiving newsletters from them all the time the threat actor

compromised their uh their constant contact account essentially allowing them to build an email and send it to legitimate users that are used to and expect to receive emails from them they get this email and it says view documents what happens next well it was a spear phishing email it had an attached html that performed html smuggling that html smuggling attack downloaded an iso file that iso file had a malicious link a shortcut file that then ran a dll and there was also a decoy file in there so if we look at another screenshot here we see it loaded an image called d e class all in uppercase it had the documents.dll file it had an ica d-class.pdf this

is a decoy this is a real pdf file and there's a shortcut there called reports if someone double-click the shortcut it would execute the dll so if we look at the shortcut we see it was running this dll and opening it and essentially launching the command and control payload and establishing a connection to some server so thankfully this particular article this particular cti had miter attack mapping now when we do miter attack mapping one it's good to see it in reports but we're really looking for the procedure level right so in this case initial access tag two spear phishing via service new bellium used the legitimate mass mailing service content constant contact to send their email yep

in that email there was a url so there was a link that they clicked on it so that's t1566 excellent and then microsoft um decided to tag execution as t1610 deploy container a payload is delivered via an iso file which is mounted on a target computer i looked at this one and i thought this this isn't right deploy container is more about deploying docker containers so what do we do we go on the mitre attack slack right are you all part of minor attack slack you definitely should we have awesome conversations there some of those conversations lead to very fun polls on twitter so we debate this whether is this deploy container or not and

we reach the conclusion it's not actually putting a payload in an iso file is a bypass of mark of the web so even though this is amazing cti provided by microsoft a top security company amongst other things the mapping might still not be correct right and there's biases around here there's great papers around this and this is why you need multiple people working together because someone could have detected this but let's move on then user execution malicious link the user double-clicked on a shortcut file and then application layer uh for command and control dll connecting over https fantastic now let's analyze and organize this for our pleasure i like building little tables they're easy to read

so description of this new bellium the russian threat actor behind the solarwinds com uh attack compromised constant contact to send malicious emails with a weaponized iso file resource development this wasn't tagged before resource development is a new miter attack tactic right it came from pre-attack and essentially we mapped it to t1584006 which is compromise infrastructure a web service say compromise constant contact to then do spear phishing via service constant contact spear phishing a link a link that downloads and does html smuggling and then defensive agent t1553.005 this is actually the correct mapping of using an iso image because an iso image is not an ntfs file so it's not marked with mark of the web

which is mark of the web when you download something from the internet and you try to execute it you generally get the smart screen pop-up that says hey this is bad i'll demo that for you uh right now if uh when we got to the demo and then it actually ran run dll32 to execute that dll and it was executed of course when the user double-clicked a malicious file a windows explorer shortcut so this is also a small deviation from the cti's attack mapping and then command and control was the only application layer but i also used an encrypted channel so you can see that something net new can have multiple ttps for us to

take a look at so we have and we look at this and say is there anything new anything we haven't tested before well constant contact is an email service that people subscribe to we've never used that to deliver phishing emails then we have that hard discussion of can we even emulate that can we hack into constant contact and send emails from there or maybe mailchimp or maybe some other email provider probably not right maybe we can simulate this some way maybe work with them but this is going to be a lot tougher conversation to have we'll give that to our managers let them deal with it what we can do is take a look at t1553005 this is

subvert trust controls mark of the web bypass with an iso image so essentially if we create an iso image and we host it on the internet when you download that image you're able to execute it without any other control saying hey stop what are you doing something bad might happen so we can then inside of that iso include a shortcut that executes a dlo via run dll32 we've done that one before right run dll32 is used by like every single ransomware threat actor right but we can test that too and have we tested this before well we've tested run dll-32 before but we haven't tested downloading an iso image from the internet that's weaponized this

is net new to me i'm sure there might have been some other cti out there that's where you asked the cti team hey can you check into this while we build a test case so what do you do for a test case you've never done you do some research what's a great place to start atomic red team right atomic red team has a bunch of atomic tests a great starting point to see if there's a quick test you can do and unfortunately there wasn't an atomic test for this so this is a perfect candidate for our purple team step three let's tabletop this now we know that this was an iso downloaded from a browser

on an internet site what kind of expected detection and response would we have here well are we allowing iso downloads on the browser is our proxy detecting that an iso file is being downloaded and can we block it or maybe our next gen firewall can see this it's a good test case what about if someone's hosting a malicious iso file internally will the browser block that from being downloaded since we it wouldn't be going through proxies or next-gen firewalls have to see it i don't know do you know do you know if you in your organization are blocking isos at the browser level and then we also think about a little more test cases this was also an email what if the iso

file came as an attachment on that email have we tested that well maybe our external security provider blocks iso and image files coming from the outside i'm going to have to check but what about internal if someone internally sends an iso file that is malicious would outlook email allow that will our endpoint security allow that with the email server the security on the email server allow it i don't know what about mounting the iso do we have any detection for that how often do do end users mount isos probably never right i can see an i.t administrator mounting an iso but are end users do we detect this and then of course execution from an iso i don't know what about

unmounting the iso so you have this discussion of course i just did this role-playing here on my head on what i think most organizations would answer but your organization is different you see the cti you have to sit and think through these test cases so step four let's create an iso how do you create an iso that's a great question i mean i remember back in the day we would create isos and you can create a windows 10 iso with that little windows 10 thing but how else can we do it well i use twitter and i want to give a shout out to matt grabber matt station definitely worth following and very quickly matt wrote something on twitter that

that made a lot of sense adversaries choose iso and image as delivery vector because smart screen doesn't apply because it's a non-ntfs volume good that's very good technical detail in this test he created an iso that has an e a hello.exe if you click and load it it won't get prompted so thank you matt that was an awesome test case then did some more work my friends over at outflank mark smee and the whole team there had an article back in march about the mark of the web and getting um around this and then at scythe i actually had talked about this talking about defensive asian because when you download an executable from the internet you have the mark of the web

so we had a nice place to start but i want to emulate the entire attack so sorry for this slide that has a lot of words but this is the attack we set up command and control using https on 443 and we generate a dll payload if you're not familiar with how to do this first step check out the c2 matrix how to how2.c2matrix.com you can download a virtual machine that i built with sans you can get up and running set up a cd2 and create a dll payload in a variety of c2 frameworks many of them empire covenant mythic right all of these allow it right not the scope of this talk what we want to focus on is how do we

build this iso and weaponize it well i went online and found multiple ways of doing this and in particular i used the folder to iso project so shout out to them again not my work folder to iso is someone else's shout out to them we are working together and i hosted this up on our github you then copy and rename this dll that you created in step one documents.dll and you put in the folder to iso working directory then in the folder to iso working directory you're going to create a shortcut called reports and set the target to run dll32 documents.dll and the entry point then from a command prompt because i like doing everything on a

command prompt even though forward to iso is a gui app on one liner folder to iso take everything in the folder to iso and build out t1553.005.iso and we're going to call it the same d class then you have to add some other parameters there now we deliver this iso we host it on a web server we send it as a phishing link all the different test cases we talked about then when someone downloads this iso you can either double click it or you can mount it with powershell and you see i do a lot of things on command line you'll we'll get to that in a minute and then once it's mounted double click

the shortcuts and see if this works now of course i documented all of this because it's all about giving back right so demo time let's pray some demo gods quick uh quick uh item there so i'm gonna use scythe this is not a sales pitch i am literally just doing this for b-sides san antonio because this is the easiest way for me to create a dll i literally click next three times and we start a campaign we then download this dll select the dll download the dll yes keep that and we're done that's it now steps what do we do well we follow the community threats page that explains what to do we grab this dll

and we need to rename it to i'm gonna copy and paste because if this doesn't work it's because i fat fingered something not because it doesn't work documents.dll we're gonna cut that and put it in this folder so this source folder you can clone from github you go into folder.iso and you put it here now my decoy pdf is actually the cis security controls version 8 that just came out so you have uh some good decoys there then we look at this reports uh shortcut we go to properties and we take a look there what it's going to do it's going to execute run dll32 yep on documents.dll with its entry point perfect let's actually rename this to dll in

uppercase i don't think it makes a difference but i'm not taking chances on live demos so the next step follow my uh items here we run folder to iso take everything in folder to iso put it into this iso file and call it d class hit enter and it's going to build my iso so over here we have an iso look at that not too big 1.4 1.4 megs now we host this somewhere right let's simulate that because ain't nobody got time for that and then we go on to another machine this is called sky and i actually need to delete this one because that was my test so let's assume that someone just downloaded this brand new file

it's now on the downloads folder because it's an iso we can't mark it as mark of the web normally down here would say this came from the internet it's not now there's multiple ways for us to mount this we can mount this with powershell or we can just double click it right a normal user and how the us8 attack worked is they double clicked it so we double click this and it automatically mounts and takes us right here and if the user falls for it they double click this reports nothing happens you say huh that's weird well let's take a look at something else let's open up this file oh look the cis controls that's pretty cool

and nothing happens nothing else happens we are like all right that's cool we go back over to our attacker machine and there we have our callback we have our shell over https just how we created it and we run a little who am i just to prove that we are on that machine and we get the response back i think i sell five second callback so in a couple seconds there you go we got it working fantastic let's get back to our slides so we ran the test ran the test and it was successful so what hypothesis do we have well we have to do detection engineering now we would have if i had time only have

six seconds so i'm gonna speak a lot faster so detection engineering this is the part where now we know that this attack worked that machine i ran this on had all av had everything clearly a bypass smart screen bypass all our detections so what hypothesis do we have well an iso file downloaded from the internet by a non-it user is suspicious an iso file sent via email is suspicious and iso mounted is suspicious on on any user's machine that's not an it user process execution from a mounted drive is suspicious and a network connection from a process that runs from a mounted drive is suspicious i want to give out a shout out to cyber monk

he wrote an awesome post on detecting uh these iso images it was a two-part post so shout out to him reached out to him on twitter asked him hey can i show you some of this work and of course they said yes so cheers to you another shout out to randy randy wrote some cool uh detections here this is sysmon on sentinel but not everyone has that right maybe you have something else well let's look at what we got where was this logged did the proxy see an iso being downloaded if we would have sent this iso in an email would it have gotten through did we have visibility does the email server see that can we block that

extension what about antivirus antivirus doesn't catch anything right edr well depends on your edr this is why you have to test you can't just plug in your edr and say yeah we're safe millions of dollars spent we're good no you need to train your people you need to tune as new things come out hopefully you have at least this law ddr does a great job at logging this stuff but why isn't there an alert can we create an alert and sysmon you can detect some of these behaviors on sysmon it's actually what uh randy did over here and then of course you need to send these logs you have to send them somewhere if it's

an edr generally it's already being sent if it's sysmon you have to send that sysmon uh alert as well uh log and then you need to create alerts once you create the alerts you then train your people because detection isn't just an alert is someone seeing this and saying oh we just got an alert that this endpoint in the accounting department just downloaded and mounted an iso probably something we need to look into or better yet try to block it right only allow certain people to download these types of files right different things different ideas all recommendations and then of course what is the response so as i did this testing i had started with atomic red team there

was no atomic test for this so i built one i gave a shout out to carrie roberts who uh is super patient with my terrible ability of creating atomic tests adam machinshi who runs the uh red team uh the atomic red team and the open source stuff at red canary and of course red canary who uh are the ones supporting atomic red team so built this out on atomic red team did a bit of testing so now you can do that test now that test is a little different if we take a look at that test what does this test do well we actually created two atomic tests one mounts the iso the second one mounts

the iso and runs the executable so now you without having to set up a c2 or anything like that can come here and use this atomic test it has a prereq command where it's going to download this iso this iso that's on atomic red team is not weaponized it's not weaponized it does not have a dll it does have a shortcut but the shortcut doesn't execute anything so you download that shortcut that iso file and then you can actually mount it through powershell you can then dismount it atomic test 2 uses that that executable created by manifestation so same initial steps you download this iso called feel the burn you then mount it and of course this one

has to because you're going to run something in there you have to determine the drive letter when you mount an iso the drive letter that mounts is going to be different on every host depending on how many drives they have so it grabs the drop the drive letter and then it executes that hello.exe you then of course can dismount it and stop the process so now anyone that wants to test this can easily test this without weaponizing the whole thing if you're a red teamer though of course you want to weaponize the entire thing so if you want to follow step by step how to do this it's obviously on the slide but i've also posted it in our

scythe community threats github which are just that community threats number of attack chains that you can use to test yourself some of them require sites some of them you can do manually this one you can do manually of course the step one we cover how to do it with site you can do it with any other c2 how to dot the c2 matrix has abundance of resources for you to do that and last few things what happens next you have operationalized this new ttps come out you check them eventually we are seeing organizations building dedicated purple teamers so i always said that this was a virtual team but in talking to some of our more

mature clients they are actually building and having a dedicated team so the red team still focuses on building new stuff the blue team focuses on uh detections and this dedicated purple team works on looking at these new items of course you still operationalize this you're still bringing red and blue together but their main thing is to understand threats understand the attack and understand the detection so this purple team maturity model was created by tim schultz who works with me at scythe he's our adversary emulation lead and was presented at the purple team summit so essentially your purple team your people need to have a threat understanding and a detection understanding and as you build that out you have deployment

integration and creation that you do for each attack and each detection something i try to do here as a virtual team of course uh better have the dedicated team now if you want more content we love giving back to the community and that's we everyone at scythe uh the unicorn so we have a threat thursday blog there we look at bigger threats of full attack chains we understand the attack the adversary we consume cyber threat intelligence we map it to mitra attack if it's not already done we release adversary emulation plans in json for attack navigator as well as forsythe we emulate the adversary and we then do detection response and it's all available for free for you to see on our blog

so references like i said i did not do all of this on my own shout out to microsoft who was the original cyber threat intel on this manifestation for showing a brief proof of concept randy uh from uh binary defense uh he was pretty much my blue teamer here building out some detections for this um so shout out to to randy um and what else red canary of course red canary and the uh detection blog as well so all these references like i said didn't do this on my own we are a herd we all work together we have to collaborate and with that i think i did it right on time uh so i want to thank you for yours

and we'll take any questions that you have thank you again what a fantastic presentation george i appreciate you taking the time today so many resources within your presentation today it's fantastic do you plan on sharing that in discord yes i actually i'm going to plan share the references i am going to hold off on the slides because i'm actually presenting this at wild west hackfest on thursday so you all got it here first for coming to b-sides but i'm gonna present it there i want to kind of maintain it uh that way i know we had smaller audience here um so yeah do want your feedback though because bigger presentation there um and yeah you all got to hear it first

so let me know how it was if you enjoyed it if anything i can improve uh it's the first run i did so the timing was a little off i want to spend a little bit more on detection engineering showing some of the sysmon uh logs that show up and whatnot but i know uh i know what i got to work on and uh and yeah i'll share the resources though of course 100 i'll post those uh in the discord right now george uh i think uh looking through the discord chats during the session you got positive positive feedback everyone loves the energy and that you provided this morning so great great stuff regarding there's a

question in the chat here will the recordings uh be available i believe if george accepted the the ability to share the sessions then those those recordings will be available after the con so thanks again george i think you're going to join us on discord if i'm not mistaken right to i am in the breakout session what is your handle just in case uh some of the audience doesn't know and they want to reach out my name at jorge ortiz j-o-r-g-e o-r-c-h-i-l-l-e-s um i'm currently in track three in the clouds so thank you for those tags there i see cheerio i see uh volunteer hoop um but yeah you can send me a direct message uh don't be afraid i do not bite

um and or post it publicly however you want uh we're here and let's continue this conversation i this test case i purple teamed via twitter uh with manifestation and randy um who are you know very good detection uh engineers so uh so let's continue the the discussion and and uh hopefully we can all connect and work together we're a herd and i'm a hacker i'm also a security researcher and an advocate for hacking is not a crime and i'd like to share with you what being a hacker means to me because you see since i was a young young child i've always been a hacker i was the kid that liked to take my toys

apart to figure out how they worked and to see if i could make them work better when i turned 12 years old i got a job i saved up enough money and i bought myself my own computer and on that computer i wiped it clean started from scratch figured out how to build it from the ground up learned programming so that i could write my own software to run on my computer i learned modem communications and serial communications so that i can figure out how these online services that i like to use were working and so when i got into my career i took a lot of different twists and turns i started off as a penetration tester i

moved into consulting i worked at high executive levels building massive application security programs across a large enterprise organization i worked for product companies and resellers but through it all the one thing that stuck with me was this identity of being a hacker now we hear the word hacker thrown about in the media and it's usually connected with some type of criminal activity but being a hacker does not mean being a criminal being a hacker is all about this innate curiosity this passion to understand how things work and to see how we can make them work differently better create new things i'm reminded of a quote from a keynote given by jason street one of my colleagues in

which he said hackers are inventors and creators not criminals and freaks and that's the reality hackers are people who want to make technology better we want to make it do cool new things we want to understand how it works so that we can innovate we can make things better and we can make our lives all the more exciting through technology so i hope you'll join with me and with hacking is not a crime spread the message that hacking and being a hacker is not a crime we're not criminals we're artisan inventors thank you so much

[Music]

[Music]

[Music]

do you