No video

Red + Blue, How Purple Are You? Identifying Gaps in The Spectrum of Security

  Рет қаралды 1,020

SpecterOps

SpecterOps

Күн бұрын

Have you heard about Purple Teaming, but you were unsure of exactly what it is? Maybe you've heard it explained as "the red and blue teams working together to improve the organization's security posture." While that may be a good high level description of Purple Teaming as a concept, it lacks a clear direction of how this outcome is achieved. As they say, "The Devil is in the details." At SpecterOps, we believe that a Purple Team exercise is one that leverages an adversarial mindset to evaluate the overall efficacy of security controls, whether they are detective or preventative.
Watch this webinar as we dive into the major questions regarding Purple Team including:
- Why small changes in adversary tradecraft have a profound effect on detectability.
- How to map variations between tools that implement the same technique.
- How to construct a representative sample set of test cases.
You can learn more about our Purple Team Assessments here: specterops.io/...

Пікірлер: 2
@shreyasd6794
@shreyasd6794 9 ай бұрын
Thankyou
@sunny_disposition
@sunny_disposition 10 ай бұрын
Problems I’ve run into as a detection engineer (blue): * red team NOT willing to share their best tradecraft * red team not understanding the challenge of designing detections that are precise enough to be viable * red team drops undetected kill chain and *mic drops*. “We win, gg”. And gets frustrated with the time it takes for blue to come up with a detection and ship / deploy it, analyze early results, deploy allowlisting, and arrive at a detect worth triaging. Some questions for others doing purps out there in the field: * are you purple teaming on your org’s actual network or a testing (and likely much simpler, less noisy) network? * what info / access are you giving red to start with and what is a successful kill chain? Do they get to drop and exec a file on the box or do they have to start with recon / enumerating the attack surface? * Is there a flag that red must exfil, or is the goal to achieve persistence inside the perim, or domain admin?
To Infinity and Beyond: Building Purple Team Test Cases
1:14:42
I Took a LUNCHBAR OFF A Poster 🤯 #shorts
00:17
Wian
Рет қаралды 8 МЛН
🩷🩵VS👿
00:38
ISSEI / いっせい
Рет қаралды 28 МЛН
He bought this so I can drive too🥹😭 #tiktok #elsarca
00:22
Elsa Arca
Рет қаралды 9 МЛН
I'll Let Myself In: Tactics of Physical Pen Testers
44:56
Wild West Hackin' Fest
Рет қаралды 2,8 МЛН
Cybersecurity Architecture: Who Are You? Identity and Access Management
31:15
The AI Cybersecurity future is here
26:42
David Bombal
Рет қаралды 156 М.
Intro Active Directory Pentesting
58:02
Martian Defense
Рет қаралды 21 М.
What do programmers actually do?
9:20
Physics Girl
Рет қаралды 2 МЛН
Rethinking Detection Engineering - Jared Atkinson (SO-CON 2020)
47:29
I Took a LUNCHBAR OFF A Poster 🤯 #shorts
00:17
Wian
Рет қаралды 8 МЛН