Attack Emulation Tools: Atomic Red Team, CALDERA and More w/ Darin and Carrie Roberts
4 Sessions – 4 Hour Classes
Instructors: Darin and Carrie Roberts
- 16 hours of hands-on interactive learning
- Introduction to MITRE ATT&CK Framework and the ATT&CK Navigator
- In-depth coverage of Atomic Red Team, MITRE CALDERA, and Prelude Operator
- Overview of other emulation tools including PurpleSharp and Mordor
- Intro to Vectr, a Purple Team campaign reporting tool
- Interactive Exercises (Labs)
- MITRE ATT&CK and the ATT&CK Navigator
- Atomic Red Team
- MITRE CALDERA
- Downloadable slides and lab walkthroughs
- Access to lab environment for six days starting the first day of class
- Six months of access to recorded class sessions available within 24 hours of live event
Attack Emulation tools help you measure, monitor and improve your security controls by executing scripted attacks. Atomic Red Team and CALDERA are two open source attack emulation projects that are mapped directly to the MITRE ATT&CK Framework. This class will provide an overview of the MITRE ATT&CK framework and give you in-depth, hands-on knowledge of how to execute scripted attacks that exercise many of the techniques defined in MITRE ATT&CK. You will be provided with hands-on lab instructions for emulating a variety of attacks and creating visualizations using the MITRE ATT&CK Navigator. At the end of this class you will have the knowledge and tools to begin executing simulated attacks within your own test environment where you can create and validate detections in a script-able and consistent way.
Whether you are a student of information security or a seasoned network defender, there is something to learn from getting involved in the Attack Emulation space and this course will help you do that.
- General understanding of MITRE ATT&CK and Attack Emulation tools
- In-depth knowledge of Atomic Red Team and tools for executing this library of attacks
- Understanding of how Attack Emulation can help you build and validate your detections
- General understanding of other available Attack Emulation tools
WHO SHOULD TAKE THIS COURSE:
Anyone interested in learning more about cyber attacks and tools to emulate and report on them through hands-on labs should take this course.
- Defenders and Blue Teamers
- Students interested in Information Security
- Penetration testers and Red Teamers
- General Security Practitioners
AUDIENCE SKILL LEVEL:
Entry level through advanced information security skills.
General familiarity with the Windows and Linux operating systems.
WHAT A STUDENT SHOULD BRING:
- Internet connectivity
- Remote Desktop Protocol (RDP) client
WHAT STUDENTS WILL BE PROVIDED WITH:
- Downloadable course slides and lab walkthroughs
- RDP access to a Windows 10 client in Azure for running labs. Lab access starts on the first day of class and is available for six days only.
Darin Roberts is a penetration tester, security analyst, and prolific blogger for Black Hills Information Security. He has completed several GIAC certifications including, GSEC, GCFE, GCIA, and GCIH. He has B.S. degrees in Computer Information Technology and Engineering and a Master’s degree in Teaching. He enjoys teaching and sharing his knowledge with others, especially through his 16-hour course on “Attack Emulation Tools: Atomic Red Team, CALDERA and More …” that he teaches on a regular basis through Wild West Hackin’ Fest Training.
Carrie Roberts is a web application developer, turned pentester, turned red teamer, turned blue. She loves to learn and give back to the community. She is currently one of the primary Atomic Red Team project maintainers and developers and has developed many of her own open source tools including the Domain Password Audit Tool (DPAT) and Slack Extract. She holds master’s Degrees in both Computer Science and Information Security Engineering. She has earned 12 GIAC certifications including the prestigious “Security Expert” (GSE) certification. She has spoken at numerous security conferences including DerbyCon and Wild West Hackin’ Fest, published many blog posts on topics ranging from social engineering to bypassing anti-virus, and contributed new research on the VBA Stomping maldoc technique. She is currently a Defense Engineer at Fortune 1.
Join the Wild West Hackin’ Fest Discord server to stay updated on future training and webcasts: Join Our Server!