Quick recap MITRE ATT&CK con with several projects and repositories to check out, some ideas and notes also https://hannahsuarez.github.io/2019/mitre-attackcon-2019/
#ATTACKcon on #purpleteam-ing -- Focus on a single TTP. Rapid emulation and validation allows for more rapid response against high threat activity. Instead of a large engagement, determine if it's an event trigger/s make sure you are covered. (Emma MacMullan, Federal Reserve)
Very nice approach, to go small. No wonder it came out as a response to working in a large enterprise like Federal Reserve.
Livestream: https://www.youtube.com/watch?v=L3KxKAGSJp4&feature=youtu.be
#ATTACKcon #watchparty Another good visualization is to think of the MITRE ATT&CK Framework as a periodic table of elements, where a mixture of particular elements (ie tactics, techniques, etc) provide a chemical reaction
https://www.youtube.com/watch?v=L3KxKAGSJp4&feature=youtu.be
#ATTACKcon Check out http://mordor.readthedocs.io
The Mordor project provides pre-recorded security events generated by simulated adversarial techniques. The pre-recorded data is categorized by platforms, adversary groups, tactics and techniques defined by the Mitre ATT&CK Framework.
#ATTACKcon #watchparty #infosec #windows #eventlog Check out https://github.com/hunters-forge/api-to-event
A repo focused primarily on documenting the relationships between API functions and security events that get generated when using such functions.
Nawww I got a shoutout from Katie Nickels, ATT&CK Threat Intelligence Lead, MITRE