SlideShare a Scribd company logo
ADVERSARY SIMULATION
“RED CELL”
APPROACHES TO
IMPROVING SECURITY
Talk Background
Introduction and overview of Red Teaming
Organization challenges & Opportunities
Redteaming / Red Cell effectiveness
• Meeting the defenders where they are at
-Adversary simulation
• Emulating Tactics Techniques and Procedures
• Being the Adversary
Resources
$whoami
• Chris Hernandez
• RedTeamer
• Former:
• Pentester
• Vuln/ Patch Mgmt
• Sysadmin
• Bug bounty hunter
• Irc handle= piffd0s
• Blog= Nopsled.ninja
• @piffd0s
Introduction to Red Teaming
• What is “Red Teaming”?
• Origins of “Red Team”
• Examples of Red Teaming Failures
• Examples of Red Team Successes
What is Red Teaming?
• Both Approach, Mindset and Tactics
• Takes many forms, Tabletop Exercises, Alternative
analysis, computer models, and vulnerability probes.
• Critical Thinking
• A Therapist…
What are its origins?
• Originated in the 1960’s military war-game exercises
• Red Team was meant to emulate the soviet union
• 1963 - First historical example was a redteam exercise structured
around procuring a long range bomber.
• Most early examples are structured around determining soviet
unions capability
Red Team Failures: Operation Eagle Claw
• Failed mission to rescue 52
diplomats held captive in the
US Embassy in Tehran.
• Operation was “need to know”
not Red Teamed
• Operation was initiated
without enough planning and
foresight into potential
challenges / obstacles
Unified Vision ‘01 & Millennium Challenge ‘02
• Millenium challenge ’02
• Red Cell Is highly restricted in
its actions
• Red Cell pre-emptively attacks
US navy fleet with all of their
air and sea resources sinking
21 Navy Vessels
• White Cell “refloats” sunken
navy vessels
• Unified Vision ’01
• White Cell informs Red Cell
that Blue Team has destroyed
all of their 21 hidden ballistic
missile silos
• Blue Team commander never
actually new the location of
any of the 21 silos
RedTeam Success Stories
• New York Marathon, NYPD and New York Roadrunners
• Cover scenarios like:
• How do you identify tainted water sources
• How to respond if drones show up in specific locations
• Race can be diverted at any point
• Israeli Defense Force – “Ipcha Mistabra”
• The opposite is most likely
• Small group in the intelligence branch
• Briefs Officials and Leaders on opposite explanations for scenarios
Organizational Challenges
• Overcoming Groupthink
• Maintaining Divergent thought
• Remaining Skeptical
• Assimilation into culture
• Communicating risk effectively
• Metacognition
• Leadership buy in
• “Gaming” the Op
Red Cell Effectiveness
• Ex. 57th adversary tactics group
• Only Highly skilled pilots are
allowed to become “aggressors”
• Allowed only to use known
adversary tactics and techniques
depending on who they are
emulating
• Same should apply to all red
teams
• Adversary emulation is key to
realistic simulations
Red Cell Effectiveness
• Effective adversary emulation
can mean being a “worse”
threat actor
• Tests defenders “post-
compromise” security posture.
Aka “assumed breach model”
• Post compromise / foothold
can also save valuable time
and money.
Adversary Skill and Detection Model
0
1
2
3
4
5
6
Ignorance Detection Proactive Pre-emptive
Difficulty
Difficulty
ScriptKiddie
Criminal(s)
APT
What are the benefits of an effective Red Cell?
• Train and measure IR teams detection and response.
• MSFT measures this as MTTD MTTR Mean time to
detect, and Mean Time to Recovery
• Validates investment in very expensive security
products, services, and subscriptions
An example red cell exercise
• Build a relevant threat model based on your industry
threats, or competitors breaches / news events
• Story board the attack
• Determine where IR should detect and respond
• Use Red Team to validate story board
• What went well / what went wrong – postmortem analysis
• Debrief Tactics
Putting it all together – Adversary simulation
• Emulate realistic threat actors TTPs
• Assume breach model
• Model attacker activity to your story board
• Information exchange between red and blue teams*
• Protect Red Team culture
• Repeat in a reasonable amount of time
Example Adversary Simulation – TTPs – “Deep Panda”
After seeing how these indicators were being applied, though, I came to realize
something very interesting: almost no one is using them effectively. - Pyramid
of Pain
ADDITIONAL RESOURCES
Books:
Red Team – Micah Zenko
Applied Critical Thinking Handbook – UFMCS
Online:
Microsoft Enterprise Cloud Redteaming Whitepaper
2015’s Redteam Tradecraft / Adversary Simulation – Raphael Mudge
The Pyramid of Pain – David Bianco
Veris Group - Adaptive Threat Devision – Will Shroeder and Justin Warner
The Adversary Manifesto - Crowdstrike

More Related Content

PPTX
Secure 360 adversary simulation
PDF
Agile by Sun Tzu
PPTX
The Art of Scrum - Agile Principles in ‘Sun Tzu's Art of War’ A BA perspectiv...
PPTX
Red team upgrades using sccm for malware deployment
PDF
帰ってきた Delphi
PDF
Test automation using selenium - Marketing platform
PPTX
CAPE SOCIOLOGY UNIT TWO Robertkmerton crimeanddeviance
PPTX
Cuatris vs motos
Secure 360 adversary simulation
Agile by Sun Tzu
The Art of Scrum - Agile Principles in ‘Sun Tzu's Art of War’ A BA perspectiv...
Red team upgrades using sccm for malware deployment
帰ってきた Delphi
Test automation using selenium - Marketing platform
CAPE SOCIOLOGY UNIT TWO Robertkmerton crimeanddeviance
Cuatris vs motos

Viewers also liked (12)

PDF
Irena africa 2030_r_emap_2015
PDF
Fyou pmec gauges catalog2017(api thread gauges&api thread measuring gauge...
PDF
Magento 2 Seminar - Christian Muench - Magerun2
PPTX
Buku Pedoman MUI ttg Syiah-7
PPTX
I LOVE HOI AN TOUR
PPTX
Gamifcation: Fun as a Management Tool
PPSX
11 tips for a perfect Logo
PPTX
Presentation
PDF
Comunicazione efficace online
PDF
Capítol 1 Receptes per somiar
PPS
Mujeres A Los 40
Irena africa 2030_r_emap_2015
Fyou pmec gauges catalog2017(api thread gauges&api thread measuring gauge...
Magento 2 Seminar - Christian Muench - Magerun2
Buku Pedoman MUI ttg Syiah-7
I LOVE HOI AN TOUR
Gamifcation: Fun as a Management Tool
11 tips for a perfect Logo
Presentation
Comunicazione efficace online
Capítol 1 Receptes per somiar
Mujeres A Los 40
Ad

Similar to Adversary simulation (20)

PPTX
Adversarial Emulation and the C2 Matrix - Presented at Wild West Hackin Fest ...
PPTX
Red Teaming and Energy Grid Security
PPTX
SRT Consultants - Healthcare
PPTX
ITD BSides PDX Slides
PDF
NVISO - A Journey Through Adversary Emulation - Jonas Bauters
PPTX
Purple Teaming with ATT&CK - x33fcon 2018
PPTX
Welcome to Strategic Red Team Consulting
PPTX
Srtcmasterveryshort 13303482929323-phpapp02-120227071512-phpapp02
PDF
Managing & Showing Value during Red Team Engagements & Purple Team Exercises ...
PPTX
Ethical Hacking - Red Team vs Blue Team.pptx
PPTX
Purple Team - Work it out: Organizing Effective Adversary Emulation Exercises
PDF
Red Team Assessment Services What Are They and Why Your Company Needs Them.pdf
PDF
Proactive cyber defence through adversary emulation for improving your securi...
PDF
Adversary Emulation - Red Team Village - Mayhem 2020
PPT
Simulations & Game Theory Tools For Cf Os V 9
PPTX
Using IOCs to Design and Control Threat Activities During a Red Team Engagement
PPTX
Adversarial Emulation with the C2 Matrix - Wild West WebCastin Fest
PDF
Adversary Emulation and Red Team Exercises - EDUCAUSE
PDF
Strategic Red Team Consulting - Introduction to Business Wargaming
PDF
Cliffnotes on Blue Teaming
Adversarial Emulation and the C2 Matrix - Presented at Wild West Hackin Fest ...
Red Teaming and Energy Grid Security
SRT Consultants - Healthcare
ITD BSides PDX Slides
NVISO - A Journey Through Adversary Emulation - Jonas Bauters
Purple Teaming with ATT&CK - x33fcon 2018
Welcome to Strategic Red Team Consulting
Srtcmasterveryshort 13303482929323-phpapp02-120227071512-phpapp02
Managing & Showing Value during Red Team Engagements & Purple Team Exercises ...
Ethical Hacking - Red Team vs Blue Team.pptx
Purple Team - Work it out: Organizing Effective Adversary Emulation Exercises
Red Team Assessment Services What Are They and Why Your Company Needs Them.pdf
Proactive cyber defence through adversary emulation for improving your securi...
Adversary Emulation - Red Team Village - Mayhem 2020
Simulations & Game Theory Tools For Cf Os V 9
Using IOCs to Design and Control Threat Activities During a Red Team Engagement
Adversarial Emulation with the C2 Matrix - Wild West WebCastin Fest
Adversary Emulation and Red Team Exercises - EDUCAUSE
Strategic Red Team Consulting - Introduction to Business Wargaming
Cliffnotes on Blue Teaming
Ad

Recently uploaded (20)

PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
KodekX | Application Modernization Development
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
Cloud computing and distributed systems.
PDF
Approach and Philosophy of On baking technology
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Spectroscopy.pptx food analysis technology
Reach Out and Touch Someone: Haptics and Empathic Computing
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Network Security Unit 5.pdf for BCA BBA.
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
KodekX | Application Modernization Development
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
The AUB Centre for AI in Media Proposal.docx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
NewMind AI Weekly Chronicles - August'25 Week I
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
MIND Revenue Release Quarter 2 2025 Press Release
Cloud computing and distributed systems.
Approach and Philosophy of On baking technology
Review of recent advances in non-invasive hemoglobin estimation
“AI and Expert System Decision Support & Business Intelligence Systems”
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Spectroscopy.pptx food analysis technology

Adversary simulation

  • 2. Talk Background Introduction and overview of Red Teaming Organization challenges & Opportunities Redteaming / Red Cell effectiveness • Meeting the defenders where they are at -Adversary simulation • Emulating Tactics Techniques and Procedures • Being the Adversary Resources
  • 3. $whoami • Chris Hernandez • RedTeamer • Former: • Pentester • Vuln/ Patch Mgmt • Sysadmin • Bug bounty hunter • Irc handle= piffd0s • Blog= Nopsled.ninja • @piffd0s
  • 4. Introduction to Red Teaming • What is “Red Teaming”? • Origins of “Red Team” • Examples of Red Teaming Failures • Examples of Red Team Successes
  • 5. What is Red Teaming? • Both Approach, Mindset and Tactics • Takes many forms, Tabletop Exercises, Alternative analysis, computer models, and vulnerability probes. • Critical Thinking • A Therapist…
  • 6. What are its origins? • Originated in the 1960’s military war-game exercises • Red Team was meant to emulate the soviet union • 1963 - First historical example was a redteam exercise structured around procuring a long range bomber. • Most early examples are structured around determining soviet unions capability
  • 7. Red Team Failures: Operation Eagle Claw • Failed mission to rescue 52 diplomats held captive in the US Embassy in Tehran. • Operation was “need to know” not Red Teamed • Operation was initiated without enough planning and foresight into potential challenges / obstacles
  • 8. Unified Vision ‘01 & Millennium Challenge ‘02 • Millenium challenge ’02 • Red Cell Is highly restricted in its actions • Red Cell pre-emptively attacks US navy fleet with all of their air and sea resources sinking 21 Navy Vessels • White Cell “refloats” sunken navy vessels • Unified Vision ’01 • White Cell informs Red Cell that Blue Team has destroyed all of their 21 hidden ballistic missile silos • Blue Team commander never actually new the location of any of the 21 silos
  • 9. RedTeam Success Stories • New York Marathon, NYPD and New York Roadrunners • Cover scenarios like: • How do you identify tainted water sources • How to respond if drones show up in specific locations • Race can be diverted at any point • Israeli Defense Force – “Ipcha Mistabra” • The opposite is most likely • Small group in the intelligence branch • Briefs Officials and Leaders on opposite explanations for scenarios
  • 10. Organizational Challenges • Overcoming Groupthink • Maintaining Divergent thought • Remaining Skeptical • Assimilation into culture • Communicating risk effectively • Metacognition • Leadership buy in • “Gaming” the Op
  • 11. Red Cell Effectiveness • Ex. 57th adversary tactics group • Only Highly skilled pilots are allowed to become “aggressors” • Allowed only to use known adversary tactics and techniques depending on who they are emulating • Same should apply to all red teams • Adversary emulation is key to realistic simulations
  • 12. Red Cell Effectiveness • Effective adversary emulation can mean being a “worse” threat actor • Tests defenders “post- compromise” security posture. Aka “assumed breach model” • Post compromise / foothold can also save valuable time and money.
  • 13. Adversary Skill and Detection Model 0 1 2 3 4 5 6 Ignorance Detection Proactive Pre-emptive Difficulty Difficulty ScriptKiddie Criminal(s) APT
  • 14. What are the benefits of an effective Red Cell? • Train and measure IR teams detection and response. • MSFT measures this as MTTD MTTR Mean time to detect, and Mean Time to Recovery • Validates investment in very expensive security products, services, and subscriptions
  • 15. An example red cell exercise • Build a relevant threat model based on your industry threats, or competitors breaches / news events • Story board the attack • Determine where IR should detect and respond • Use Red Team to validate story board • What went well / what went wrong – postmortem analysis • Debrief Tactics
  • 16. Putting it all together – Adversary simulation • Emulate realistic threat actors TTPs • Assume breach model • Model attacker activity to your story board • Information exchange between red and blue teams* • Protect Red Team culture • Repeat in a reasonable amount of time
  • 17. Example Adversary Simulation – TTPs – “Deep Panda” After seeing how these indicators were being applied, though, I came to realize something very interesting: almost no one is using them effectively. - Pyramid of Pain
  • 18. ADDITIONAL RESOURCES Books: Red Team – Micah Zenko Applied Critical Thinking Handbook – UFMCS Online: Microsoft Enterprise Cloud Redteaming Whitepaper 2015’s Redteam Tradecraft / Adversary Simulation – Raphael Mudge The Pyramid of Pain – David Bianco Veris Group - Adaptive Threat Devision – Will Shroeder and Justin Warner The Adversary Manifesto - Crowdstrike

Editor's Notes

  • #2: Hi everybody, I’m chris hernandez, what a pleasure it is for me to come and visit with you for a few minutes today and share some ideas that might be beneficial to you and your organization. I’m delighted to be here, I've been looking forward to it for some time. And its nice to be back, I was here not too long ago and It says something when you are invited back… it doesn't’t say everything, but it says something. Maybe it says “lets give him one more chance, and maybe he can get it right this time…” I feel two major responsibilities today, and here’s what they are… Number one, is that you get your money’s worth… It looks like no body paid for admission, but hey, at least the price of a beer or dinner And my second major responsibility is that you get your times worth, and the reason why I say that is because time is more valuable than money. If someone asks you to spend some money, sure no problem… you can get more of that… But if someone asks you to spend some time, you’ve really got to think that over… you can never get more time… so I appreciate and I understand the value of you investing your time today, and I hope this talk can be worth your time. This talk is going to be costly for me as well, its going to take some of my time… so in order for it to be worthwhile for me, I really want some of my ideas to make an impact. And I’m here not to just tell a few interesting stories and walk away, but I’m here hopefully to give you some value for your time. So, I’d like to share with you some things I’ve learned in my career in information security, these are my perspectives and opinions on techniques for improving the security of your organization…. The ideas are not new or revolutionary. I’m just trying to share what, in my experience I feel works well in regards to redteaming
  • #3: So at a high level, we talk about…
  • #4: Just briefly let me tell you my story …. I’ve worn various security hats in my career, some defensive and offensive, from helpdesk to redteaming I’ve done about everything in between and I like to think that that gives me some perspective on the challenges of security in an organization.
  • #6: Both Approach, Mindset, and TacticsIf you are a leader in an environment you probably don’t know everything that is going on. If you are wise enough to come to this conclusion you need a red team to be the bring an alternate perspective The alternative perspective would apply to your problems, and the problems of your adversary
  • #7: Earliest evidence of the origins of redteaming came out of military wargaming exercises, 1976 – Hardliners in the Ford administration didn’t agree with the CIA’s conclusion. Believed that the U.S. had a capability gap. Team “B” of experts with access to all information about known soviet military capabilities and came to an alternative conclusion compared to the CIA report.
  • #8: 3 helicopters malfunction / c130 and rh53d helicopter collided Example of what happens when there is no red teaming done in planning phases of an operation Military example, but think of business / public sector examples
  • #9: Translate this to real world / business scenarios
  • #10: Multiple contingency plans for mulpiple scenarios As a result of the redteam simulation they are able to better pretect the marathon - They are directed to come to the opposite conclusion of whatever the current plan or conventional wisdom is. They don’t just brief generals. They go to parliament. They brief the prime minister’s office and the prime minister’s Cabinet. They describe their jobs—one of the individuals I know who did the briefings—as exhaustive. You have to essentially be argumentative by design. You have to challenge and doubt everything that happens.
  • #12: Image credit: david bianco The key takeaway here is to understand that it is the highly skilled indivudual who can become an aggressor You have to be good enough, to restrict yourself to a specific capability or skillset, but that capability and skillset changes based on who you are emulating
  • #15: ----- Meeting Notes (1/20/16 15:14) ----- nobody wants to drop 100k on a fireye and find out its configured wrong
  • #17: This is a great argument for Red Teams ingesting threat intelligence reports < they can work it into their tradecraft for redteam operations If you want to spend a year on an op working to get in, with an 0-day you can, but the simple fact is, if an adversary wants in bad enough, they will get in. Again, if you know an adveraries MO, storyboard it, and determine where it could get caught and where defenses are lacking Debrief after op completion Teams need to be external in terms of culture, but internal and aware in terms of critical thought Demoralizing if the blue team gets crushed week in and out
  • #18: An appropriate way to ingest threat intelligence data