Micro Emulation Plans by MITRE-Engenuity

We enjoy imitating the opposition.  In fact, it’s so important that they’ve written, spoken, trained on it, and are still developing and disseminating more emulation plans (including one of the first public Adversary Emulation Plans).  However, many organisations are unable to overcome the entry barrier due to the expense and complexity involved in developing or even carrying out the majority of adversary emulation plans. The Center for Threat-Informed Defense (Center) collaborated with AttackIQ, Inc., Booz Allen Hamilton, Inc., Citigroup Technology, Inc., Ernst & Young U.S. LLP, Fujitsu, HCA — Information Technology & Services, Inc., IBM Corporation, Microsoft Corporation, and Verizon Business Services to create Micro Emulation Plans in an effort to make adversary emulation accessible to a wider audience. By using simple to use executable binaries that any user can use, these emulation plans re-imagine adversary emulation to focus on very specific threat-informed defensive objectives. Currently Used Adversary EmulationThe four general steps that make up an operation when it comes to adversary emulation today are cyber threat intelligence (CTI) research,… Continue reading Micro Emulation Plans by MITRE-Engenuity

BARK: A PowerShell script was created to aid the BloodHound Enterprise team in locating and regularly validating abuse primitives.

BloodHound Attack Research Kit is referred to as BARK. It is a PowerShell script created to help the BloodHound Enterprise team find and keep track of abuse primitives. At the moment, BARK is concentrated on Microsoft’s Azure family of goods and services. There are no external dependencies needed for BARK. The functions of BARK are… Continue reading BARK: A PowerShell script was created to aid the BloodHound Enterprise team in locating and regularly validating abuse primitives.

Exit mobile version