YoVDO

Automated Adversary Emulation Using Caldera

Offered By: BruCON Security Conference via YouTube

Tags

BruCON Courses Mitre Att&ck Framework Courses

Course Description

Overview

Explore automated adversary emulation using MITRE's Caldera 2.0 in this comprehensive conference talk from BruCON Security Conference. Dive into the world of MITRE ATT&CK and learn how tools like Caldera facilitate corporate adoption of this important cybersecurity standard. Discover how to leverage Caldera's new extendibility features to maximize its effectiveness in assessing an organization's security posture. Gain insights on improving Caldera's reporting engine, building additional plugins to increase ATT&CK coverage, and adapting the tool to work around common security controls like Windows 10's ExploitGuard and AMSI. Learn practical skills for extending adversary emulation capabilities without investing in expensive commercial tools. Witness technical demonstrations and explore the nitty-gritty details of development efforts, including publicly released plugins. Equip yourself with the knowledge to enhance your organization's cybersecurity defenses through advanced adversary emulation techniques.

Syllabus

08 - BruCON 0x0B - Automated adversary emulation using Caldera - Erik Van Buggenhout


Taught by

BruCON Security Conference

Related Courses

Privilege Escalation with Rubeus
Pluralsight
Reconnaissance with OWASP Amass
Pluralsight
Defense Evasion with ProxyChains
Pluralsight
Reconnaissance with Sn1per
Pluralsight
Execution with macro_pack
Pluralsight