ATT&CK the Attacker Assessing & Improving Detection - - PowerPoint PPT Presentation

att ck the attacker
SMART_READER_LITE
LIVE PREVIEW

ATT&CK the Attacker Assessing & Improving Detection - - PowerPoint PPT Presentation

ATT&CK the Attacker Assessing & Improving Detection Capabilities # whoami Christian Kollee Studied Computer Science at University of Erlangen- Nueremberg (Diplom-Informatik) Several years at various universities and at


slide-1
SLIDE 1

ATT&CK™ the Attacker

Assessing & Improving Detection Capabilities

slide-2
SLIDE 2

# whoami

Christian Kollee

✗ Studied Computer Science at University of Erlangen-

Nueremberg (Diplom-Informatik)

✗ Several years at various universities and at Fraunhofer ✗ IT security since 2012 ✗ Currently working as IT Security Consultant

(Security Monitoring, Incident Response, Digital Forensics)

slide-3
SLIDE 3

Why should we care about detection?

slide-4
SLIDE 4

Defender’s Dilemma The intruder only needs to exploit one of the victims in order to compromise the enterprise. Intruder’s Dilemma

The defender only needs to detect one of the indicators of the intruder’s presence to initiate incident response within the enterprise.

Richard Bejtlich - https://taosecurity.blogspot.de/2009/05/defenders-dilemma-and-intruders-dilemma.html

slide-5
SLIDE 5

How can we detect these indicators?

slide-6
SLIDE 6

All models are wrong; some models are useful

  • George Box
slide-7
SLIDE 7

Recon Weaponization Delivery Exploitation Installation / Maintain C2 / Control Actives on Objective / Execute

Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chain; Hutchins, E. & Cloppert, M. & Amin, R.; 2011

ATT&CK™ Enterprise

Intrusion Kill Chain

slide-8
SLIDE 8

10 20 30 40 50 60 Scheduled Task Timestomp Remote Desktop Protocol Scheduled Task 10 20 30 40 50 60 10 20 30 40 50 60 10 20 30 40 50 60 10 20 30 40 50 60

Ten ATT&CK™ – Tactics 188 different techniques, e.g.,

slide-9
SLIDE 9

Technique name Technique description Info box Examples Mitigation Detection References

slide-10
SLIDE 10

How to use ATT&CKTM from a defender perspective?

slide-11
SLIDE 11

Asses your current detection capabilities 1 Prioritize additional data sources based

  • n the threats you are facing

3 Identify and extend your detection capabilities based on your data sources 2

slide-12
SLIDE 12

Asses your current detection capabilities 1

Goto 3 and prioritize your data source based on your threats

➢ Use your playbooks ➢ Use adversarial emulation tools

slide-13
SLIDE 13

Identify and extend your detection capabilities based on your data sources 2

Access Token Anti-Virus API Monitoring Authentication Logs Binary File Metadata BIOS Browser Extensions Data Loss Prevention Digital Certifcation Logs DLL Monitoring Extensible Firmware Interface (EFI) Environment Variable File Monitoring Host Network Interface Kernel Drivers Loaded DLLs Malware Reverse Engineering Master Boot Record (MBR) Named Pipes Netfow Network Device Logs Network Protocol Analysis Packet Capture Powershell Logs Process Command- Lines Parameters Process Monitoring Process Use of Network Sensor Health and Status Services SSL/TLS Inspection System Calls Third-Party Application Logs User Interface Volume Boot Record (VBR) Windows Error Reporting Windows Event Logs Windows Registry WMI Objects

slide-14
SLIDE 14

Prioritize additional data sources based

  • n the threats you are facing

3

➢ What incidents do you have? ➢ How could you detect them (earlier)? ➢ What sources are required? ➢ Network Protocol

Analysis (DNS)

➢ Netfows ➢ Process Monitoring ➢ Windows Event Logs

slide-15
SLIDE 15

Conclusion

slide-16
SLIDE 16

Asses your current detection capabilities 1 Prioritize additional data sources based on the threats you are facing 3 Identify and extend your detection capabilities based on your data sources 2

One approach using ATT&CKTM

Intruder’s Dilemma

The defender only needs to detect one of the indicators of the intruder’s presence to initiate incident response within the enterprise.

slide-17
SLIDE 17
slide-18
SLIDE 18

Thank you! Questions?

slide-19
SLIDE 19

Endgame – Red Team Automation (RTA) – https://github.com/endgameinc/RTA MITRE – CALDERA – https://github.com/mitre/caldera Uber – Metta – https://github.com/uber-common/metta Red Canary – Atomic Red Team – https://github.com/redcanaryco/atomic-red-team Nextron Systems – APTSimulator – https://github.com/NextronSystems/APTSimulator

Adversarial Emulation

MITRE ATT&CKTM – https://attack.mitre.org MTIRE ATT&CKTM Navigator – https://mitre.github.io/attack-navigator/enterprise/

MITRE ATT&CKTM Pictures

A little white mug of espresso on a wood table – Photo by Annie Spratt on Unsplash Fire, fame, danger, and van – Photo by Dawn Armfeld on Unsplash Desert – Photo by Mark Eder on Unsplash Roots – Photo by David Peters on Unsplash Fortress – Photo by dMz on Pixabay