Mitre - Caldera C2 - Red Team / Purple Team

  Рет қаралды 3,922

Mitch O'Donnell

Mitch O'Donnell

Күн бұрын

We go over Caldera C2 from Mitre. Install using Docker, agent beacon deploy on Linux hosts using the Sandcat payload, and useful plugins such as visual mappings and Navigator.
Useful tooling for Red Team, Purple Team, and threat emulations.
github.com/mit...
caldera.readth...
attack.mitre.o...
mitre-attack.g...
github.com/Sec...

Пікірлер: 4
@rajkrishnamurthy8474
@rajkrishnamurthy8474 Жыл бұрын
Great presentation Mitch.💯
@lmaoroflcopter
@lmaoroflcopter Жыл бұрын
Nice presentation! Really interested in how you use vectr too. Would you use the two together? Or does the reporting in caldera somewhat replace vectr? Also what the heck is the blue team side of things in caldera? It feels like it's a sort of IR agent but then it seems to run the very same commands red does.
@mitchodonnell3976
@mitchodonnell3976 Жыл бұрын
We primarily use Vectr for our Purple Team engagements. Caldera can be used but not always, all depends on what we are testing or trying to achieve. For example, if you are testing your security tooling, you want to verify the tool does exactly what the vendor or engineering team claims the tool does. So you plan out your attack path and map it within Vectr. Then your red and blue teams jump into a room (virtual or real) and kick off the engagement. Caldera is useful for automating the engagement but I've found manual attacks work for the first run, then automate for the 2nd, 3rd, etc run using a profile in Caldera. For reporting, we have our own template built and integrated into GhostWriter, caldera logs are dumped using the json exported and converted over to GhostWriter oplogs. Usually the purple team stuff is fast and only requires screen shots dumped into a slide deck.
@mitchodonnell3976
@mitchodonnell3976 Жыл бұрын
Oh as far as the blue team agent, you are correct! It's for incident response, primarily automated threat profiles. I've never had to run one from the blue side, always was able to decompose a threat, put that into Caldera, then automate with the red team login.
Automating Adversary Emulation with MITRE Caldera
19:44
CloudnSec with Andre Camillo
Рет қаралды 7 М.
Using MITRE Caldera to Emulate Threats in Your Environment
16:55
Raiders of the Lost ARP
Рет қаралды 9 М.
Magic or …? 😱 reveal video on profile 🫢
00:14
Andrey Grechka
Рет қаралды 59 МЛН
Самое неинтересное видео
00:32
Miracle
Рет қаралды 1,2 МЛН
Violet Beauregarde Doll🫐
00:58
PIRANKA
Рет қаралды 50 МЛН
Best Trending Technologies to learn
5:10
Technology World
Рет қаралды 10
Red Teaming - Convert Findings to Purple Teaming - Vectr
24:01
Mitch O'Donnell
Рет қаралды 1,8 М.
CALDERA TryHackMe - Task 1 - 6
1:45:11
Djalil Ayed
Рет қаралды 2,9 М.
Red Team - C2 Redirectors - Overview and Installation
43:56
Mitch O'Donnell
Рет қаралды 1,9 М.
Emulating Adversary Actions in the Operational Environment with Caldera OT
22:01
Adversary Emulation with Caldera | Red Team Series 1-13
1:37:00
Akamai Developer
Рет қаралды 21 М.
Red Team Adversary Emulation With Caldera
1:37:58
HackerSploit
Рет қаралды 113 М.
TailsOS Guide For The Ultra Paranoid
35:32
Mental Outlaw
Рет қаралды 427 М.
MITRE ATT&CKcon 2018: ATT&CK: All the Things
29:22
mitrecorp
Рет қаралды 9 М.
Magic or …? 😱 reveal video on profile 🫢
00:14
Andrey Grechka
Рет қаралды 59 МЛН