Attack Flow DiagramsEveryone has heard that an image is worth a thousand words. The same applies when generating reports. This is especially true in those containing complex threads and activities. Red Teaming is about understanding a threat's impact of actions against a target. Although this is documented in logs and eventually
written as observations, a visual diagram is extremely valuable and one of the most effective ways to describe and highlight key activities and observations.
The diagram above is a sanitized example of areal Red Team engagement leveraging a simple assumed breach model. This engagement was used to train anew red team using a small, simplified engagement. The engagement goals included the following:
●
Train and expose anew red
team to the red team processes●
Measure the ability a threat has to move laterally
●
Measure the defender’s ability to
detect C traffic and binaries Measure the ability to perform and subsequently detect critical data exfiltration
This Red Team engagement was designed as C training fora new
Red Team and to educate a BlueTeam on threat techniques. The Red Team designed and staged Command and Control with specific
IOCs and threat objectives using a threat profile to document the threat design. The
diagram highlights the actions, successes, and failures of the Red Team and was created using the commercial mind mapping software XMind (http://www.xmind.net/) but could have easily been created in a number of other diagraming tools.
A properly designed diagram can be used solely to present a Red Team engagement. The power of an image is truly immense. Diagrams are not required but are highly encouraged.
Consider ThisThe authors of this book often only use diagrams to drive executive or technical briefings verses using along text driven document or PowerPoint presentation. Graphical presentations area great way to convey the complex actions of a Red Team engagement.