Development and operations a practical guide



Download 4.62 Mb.
View original pdf
Page3/96
Date11.02.2023
Size4.62 Mb.
#60628
1   2   3   4   5   6   7   8   9   ...   96
1 Joe Vest, James Tubberville Red Team Development and Operations
Table of Contents
AUTHORS' STATEMENT
PREFACE
ACKNOWLEDGMENTS
HOW TO USE THE BOOK
C
OMPANION
WEBSITE
(
HTTP
://
REDTEAM
GUIDE
)
TABLE OF CONTENTS
INTRODUCTION
R
ED
T
EAMS
IN
S
ECURITY
T
ESTING
R
ED
T
EAMING
O
RGANIZATIONS
K
EY
C
HAPTER
T
AKEAWAYS
H
OMEWORK
ENGAGEMENT PLANNING
C
OST
AND
F
UNDING
S
COPE
D
URATION
P
ERSONNEL
L
ABOR
C
OST
E
QUIPMENT
AND
S
OFTWARE
C
OST
T
RAVEL
C
OST
P
RE
-
AND
P
OST
-E
NGAGEMENT
C
OST
F
REQUENCY
E
NGAGEMENT
N
OTIFICATIONS
R
OLES
AND
R
ESPONSIBILITIES
R
ULES
OF
E
NGAGEMENT
(ROE)
M
ANAGING
R
ISK
T
HREAT
P
LANNING
T
HREAT
P
ROFILE
C
REATING
A
T
HREAT
P
ROFILE
BY
D
ECOMPOSING
A
T
HREAT
A
REVIEW
OF
A
BLACKHAT
'
S
TRADECRAFT
T
HREAT
P
ERSPECTIVE
T
HREAT
S
CENARIO
T
HREAT
E
MULATION
S
CENARIO
M
ODELS
I
NDICATORS
OF
C
OMPROMISE
E
NGAGEMENT
C
ONCEPTS
D
ECONFLICTION
D
ATA
H
ANDLING
K
EY
C
HAPTER
T
AKEAWAYS
H
OMEWORK
ENGAGEMENT EXECUTION
D
ATA
R
EPOSITORY
D
ATA
C
OLLECTION
T
RADECRAFT
G
ENERAL
G
UIDANCE
E
XECUTION
C
ONCEPTS
T
OOLS
AND
T
OOL
E
XAMPLES
C
OMMAND
AND
C
ONTROL
(C2)
K
EY
C
HAPTER
T
AKEAWAYS


H
OMEWORK
ENGAGEMENT CULMINATION
S
ANITIZATION
AND
C
LEANUP
O
PERATOR
L
OG
V
ERIFICATION
P
RE
-R
EPORT
B
RIEFINGS
K
EY
C
HAPTER
T
AKEAWAYS
H
OMEWORK
ENGAGEMENT REPORTING
A
TTACK
F
LOW
D
IAGRAMS
O
BSERVATIONS
VS
. F
INDINGS
R
ISK
R
ATING
AND
M
ETRICS
R
ISK
M
ATRICES
C
OMPARISON
A
TTACK
N
ARRATIVE
K
EY
C
HAPTER
T
AKEAWAYS
H
OMEWORK
SUMMARY
CONCLUSION
APPENDIX A EXAMPLE TEMPLATES
APPENDIX B THOUGHT EXERCISES
A
DVERSARIAL
M
INDSET
C
HALLENGE
M
INDSET
C
HALLENGE
C
OMMENTS
AND
A
NSWERS
APPENDIX C DECOMPOSING A THREAT EXERCISE
D
ESCRIPTION
E
XERCISE
S
CENARIO
G
OAL
R
ESOURCES
B
EGIN
THE
E
XERCISE
C
REATE
A
THREAT
PROFILE
P
OSSIBLE
S
OLUTION
GLOSSARY OF TERMS


Introduction
Designing, deploying, and managing a comprehensive security program is complex and challenging and, therefore, not an easy task for most. Organizations are influenced and pressured from multiple,
often competing, sources. This pressure can come from customers, compliance, management, peers,
finance, public opinion, and publicly available news, just to name a few. Even when faced with these challenges, organizations are generally able to overcome these pressures and implement what is
considered to be a robust security program. Organizations can satisfy the various parties and, at least on paper, describe a security program designed to stop malicious cyber-attacks. As a result, audit and compliance checks pass, robust patch management systems are deployed, and vulnerability assessments and penetration tests are conducted. These are significant initial steps toward providing the means to defend a network from attack. Unfortunately, this often falls short in achieving the primary goal of preventing, detecting, and responding to real threats. Why What is missing The real question to consider is:
Are organizations truly building security programs designed to address the threat?
A security program includes many components such as staff, policies, procedures, tools, management,
oversight, incident response, etc. The program is designed and built with the assistance of members from several different divisions or job functions, all contributing their thoughts and security requirements. Security programs often use this strategy for ensuring a complete and holistic security program however, what or who is often missing Has anyone on the security operations team ever seen a bad guy Has anyone on the team attacked or compromised a network To what extent To quote Peter in the movie Office Space. "I can’t believe what a bunch of nerds we are. We’re
looking up money laundering in a dictionary.” Are teams designing defenses for an enemy they do not know or understand?
Is the threat included insecurity planning?
Good intentions by a group of intelligent people do not add up to understanding threats or how they operate. If the goal of security operations is to prevent, detect, respond, and recover against malicious actions, it only makes sense to include the opinions of those whom you are defending against.
Unfortunately, security design often excludes the threat or threat perspective. This omission often leads to the mitigation or acceptance of risks not fully understood or revealed during traditional security testing and auditing. The result is a severe false sense of security. Areal threat knows this and uses it to their advantage.
Consider This
Does a threat know a target has a robust security program?
Do threats perform actions that will trigger an alert or get them caught?

Are threats still successful?
If so, why are threats able to successfully achieve its goals and negatively impact an organization when that organization has a comprehensive security program To understand this,

Download 4.62 Mb.

Share with your friends:
1   2   3   4   5   6   7   8   9   ...   96




The database is protected by copyright ©ininet.org 2024
send message

    Main page