atomic-red-team
EDRs
atomic-red-team | EDRs | |
---|---|---|
32 | 7 | |
9,079 | 1,889 | |
1.6% | - | |
9.7 | 0.0 | |
4 days ago | about 1 year ago | |
C | C | |
MIT License | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
atomic-red-team
-
Which Antivirus do you recommend and why?
You can write your own or look at testing tools like Cytest to ensure that your business goals are met and to ensure your sensors are configured correctly, and ART for attack chains.
-
Exfiltration Detections
I had heard that Falcon Overwatch has a detection for Exfiltration for C2, but I was not able to trigger it using my personal Kali Machine to host a C2 server with https://github.com/cedowens/SimpleC2_Server and then used Atomic Red Team: https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1041/T1041.md
- EDR Attack Simulation
-
Red Team Methodology
Yup what the above said, you can use atomic red https://github.com/redcanaryco/atomic-red-team
-
“Malicious” powershell commands for demo
Atomic red team have tests that should trigger it, it also has a clear description of what it does and how to clean up afterwards. https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1059.001/T1059.001.md suggest that you try obfuscation or cradle.
-
Initial acess simulation tests
Dated but still full of goodness. https://github.com/redcanaryco/atomic-red-team/tree/e88a1ea463964839e267dba74ec1cf7bf634ccbf/ARTifacts/Initial_Access
-
What are some good showcases of Collection-tactics of the MITRE ATT&CK matrix?
Are you familiar with Atomic Red Team? Many quick & practical sample tests you can often run without much effort or prep work. All tests map to Techniques - a quick way to search through them all at the Tactic level is by searching within the CSV index of all their current tests here (I counted ~50 Collection-related tests just now): https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/Indexes/Indexes-CSV/index.csv
-
Testing an XDR solution
Check out Atomic Red Team’s Redcanary.
- Blue Teamers: What makes a good detection use case?
- Custom IOAs: What's The Best Resource/Documentation For This On CS Falcon
EDRs
-
Red team engagement help!
As for the shellcode. Just encrypt the shellcode and use some form of injection like QueueUserAPC injection. If the EDR does usermode hooking, remap NTDLL and Kernel32 first, if it’s kernel mode only (MDE for example) just patch either the Win32 API ETWEventWrite or NT api NTEventTrace with a ret (0x3c on 64 bit x86) an example is here https://github.com/Mr-Un1k0d3r/EDRs/blob/main/unhook_bof.c
-
Testing an XDR solution
Hi, RedCanary from Atomic Red Team is great, but you have to adapt it. Also here are some great infos regarding EDR and how to bypass them : https://github.com/Mr-Un1k0d3r/EDRs
- This repo contains information about EDRs that can be useful during red team exercise.
- Information on EDRs intended to support Red Teamers. The gaps and techniques documents are of huge value to Blue.
- Interesting stuff
-
What EDRs Hook on Microsoft Windows i.e. where the gaps exist in terms of telemetry / detection coverage
Source: https://github.com/Mr-Un1k0d3r/EDRs/pull/5
- EDRs - Hooked Functions from various EDR's
What are some alternatives?
detection-rules - Rules for Elastic Security's detection engine
Limelighter - A tool for generating fake code signing certificates or signing real ones
sigma - Main Sigma Rule Repository
Freeze - Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods
BLUESPAWN - An Active Defense and EDR software to empower Blue Teams
NSGenCS - Extendable payload obfuscation and delivery framework
sysmon-modular - A repository of sysmon configuration modules
CarbonCopy - A tool which creates a spoofed certificate of any online website and signs an Executable for AV Evasion. Works for both Windows and Linux
Incident-Playbook - GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]
SigThief - Stealing Signatures and Making One Invalid Signature at a Time
public-pentesting-reports - A list of public penetration test reports published by several consulting firms and academic security groups.
Certified-Kubernetes-Security-Specialist - Curated resources help you prepare for the CNCF/Linux Foundation CKS 2021 "Kubernetes Certified Security Specialist" Certification exam. Please provide feedback or requests by raising issues, or making a pull request. All feedback for improvements are welcome. thank you.