Micro Emulation Plans by MITRE-Engenuity

We enjoy imitating the opposition.  In fact, it’s so important that they’ve written, spoken, trained on it, and are still developing and disseminating more emulation plans (including one of the first public Adversary Emulation Plans).  However, many organisations are unable to overcome the entry barrier due to the expense and complexity involved in developing or even carrying out the majority of adversary emulation plans. The Center for Threat-Informed Defense (Center) collaborated with AttackIQ, Inc., Booz Allen Hamilton, Inc., Citigroup Technology, Inc., Ernst & Young U.S. LLP, Fujitsu, HCA — Information Technology & Services, Inc., IBM Corporation, Microsoft Corporation, and Verizon Business Services to create Micro Emulation Plans in an effort to make adversary emulation accessible to a wider audience. By using simple to use executable binaries that any user can use, these emulation plans re-imagine adversary emulation to focus on very specific threat-informed defensive objectives. Currently Used Adversary EmulationThe four general steps that make up an operation when it comes to adversary emulation today are cyber threat intelligence (CTI) research,… Continue reading Micro Emulation Plans by MITRE-Engenuity

Campaigns to be Introduced to MITRE ATT&CK V12

Primary Articles Published by Matt Malona In ATT&CK 2022 roadmap, at ATT&CKCon 3.0, and most recently on the SANS Threat Analysis Rundown, we’ve discussed incorporating campaigns into ATT&CK, but their release is soon approaching! Beginning with the release of ATT&CK v12 on October 25, you will be able to use the Campaigns structure for all… Continue reading Campaigns to be Introduced to MITRE ATT&CK V12

Penetration testing Attack Infrastructure

Attack Infra Penetration testing Planning Fill the planning gap Attack Infrastructure/C2 Recon Social Engineering Weaponization Initial Access/foothold Network Propagation Action on Objectives Mitre Attack Framework Pre attack framework is to be followed. The MITRE ATT&CK™ framework is a comprehensive matrix of tactics and techniques used by threat hunters, red teamers, and defenders to better classify attacks and assess an organization’s risk… Continue reading Penetration testing Attack Infrastructure

Exit mobile version