SlideShare a Scribd company logo
When is a Red Team a Red Team?
M AY 2 0 1 9
Agenda
[+] Introductions 1m
[+] Setting the Stage 5m
[+] Tales from the Trenches 13m
[+] Conclusion 1m
> whoami
• Sanjiv Kawa
• Penetration Tester and Red Teamer
• I Lead Nettitude's Penetration Testing Team
kawabungah
skahwah
> whois Nettitude
• 160 security professionals
• Global presence
• Significant Industry Influence
Nettitude’s Research and Zero Days
Setting the Stage
Confusion
• What is Red Teaming?
• Who is it for?
• What does it achieve?
• Why is it important?
The Current State of Technical Assurance
The Current State of Technical Assurance
What is a Red Team Engagement?
PenTest+
Purpose of a Red Team Engagement
Holistically test your organization against a real world breach scenario
Driven from real world threats Focus on Depth and not Breadth Exercise your Blue Team
People Process
Technology
https://www.flaticon.com/free-icon/team_476700
https://www.flaticon.com/free-icon/settings_126472
https://www.flaticon.com/free-icon/laptop_114734
What Does a Red Team Engagement Look Like?
What Does a Red Team Engagement Look Like?
What Does a Red Team Engagement Look Like?
Why is Red Teaming Important?
Exercise Your Blue Team
People Process
Technology
Tales from the Trenches
Some of our Achievements
• We get to work with some awesome clients
• We have an extremely high success rate in reaching objectives
Some of our Achievements
• We get to work with some awesome clients
• We have an extremely high success rate in reaching objectives
https://www.flaticon.com/free-icon/bank_1066122
https://www.flaticon.com/free-icon/medical-history_1685819
https://www.flaticon.com/free-icon/benefits_1369921
https://www.flaticon.com/free-icon/family_1396773
Tales from the Trenches
I’m going to walk you through a red team engagement we did for a
stock exchange
Tales from the Trenches
Disclaimer:
Some areas have been replaced with fictitious people, other areas
are heavily redacted to protect the identity of the Client and their
employees …
Engagement Particulars
Client: Large Stock Exchange
Objective: Integrity of Real Time Trading System (TS)
Assessment: Threat Intelligence
Scenario 1: External Threat
Scenario 2: Insider Threat
Assessment: Detection and Response Capabilities
Threat Intelligence
Mitre ATT&CK Group ID:
G0032
AKA: Lazarus Group
North Korea
Threat Intelligence: Lazarus Group
Based on TI: Initial entry is going to be a targeted phish
Threat Intelligence: Recon
If I had 8 hours to chop down a tree, I would spend 6 of those
hours sharpening my axe
Many, many, many tools ...
Threat Intelligence: Finding Targets to Phish
• In-house developed,
publicly available tool
• Checks HIBP for breaches
• Name, email, title, etc
Threat Intelligence: Building Pretext
• Find target employees who work with TS
• Senior Trader at Stock Company
• Works with TS
• A+ candidate to phish!
Threat Intelligence: Building Pretext
Threat Intelligence: Building Pretext
Priority Target at Stock
Exchange
Position Pretext from LinkedIn
1 Rey Oakley Senior Trader Joseph Thompson – Capital Ventures
2 Mike Cortes IT Support Sarah Cho – Computer Stop
3 Karen Hayes Database Admin John Smith – DevShop
4 Stacy Chan Project Manager Mike Jacklin – Logistics R Us
• Don’t stop at one, maximize your chances.
Handover
At this point, the TI Team hands over a “target pack” to the Red Team
External Threat: Delivery
External Threat: Delivery
External Threat: Weaponization
External Threat: Delivery and Execution
• Pretext: Recruitment and Career Opportunities
• Delivery: Targeted Phishing (4 users)
• Objective: Impact the Integrity of TS
0
1
2
3
4
5
Users Targeted Emails Confirmed Opened Links Clicked Command and Control Obtained
Targeted Phishing Statistics
External Threat: Execution
Execution? Target at Stock
Exchange
Position Pretext from LinkedIn
ý Rey Oakley Senior Trader Joseph Thompson – Capital Ventures
ý Mike Cortes IT Support Sarah Cho – Computer Stop
þ Karen Hayes Database Admin John Smith – DevShop
þ Stacy Chan Project Manager Mike Jacklin – Logistics R Us
• Who’s workstation are we on?
External Threat: Acting on Objectives
Karen Hayes
External Threat: Acting on Objectives
þ Know where TS Lives
þ Know users who access TS
Karen Hayes
Global File Share TS Documents
Active Directory TS Users
External Threat: Acting on Objectives
Compromised
Workstation
Trader
Workstation
External Threat: Acting on Objectives
Karen Hayes
Karen Hayes
Active Directory
External Threat: Acting on Objectives
Karen Hayes
Karen Hayes
Citrix User
CVE-2018-6857: Sophos Safeguard Priv Esc 0-day
External Threat: Acting on Objectives
Karen Hayes
Citrix Administrator
Workstation Administrator
Other Citrix Servers
External Threat: Acting on Objectives
Compromised
Workstation
Trader
Workstation
External Threat: Acting on Objectives
Compromised
Workstation
Trader
Workstation
Workstation
Administrator
External Threat: Acting on Objectives
Trader Workstation
When is a Red Team a Red Team
Now What?
Detection and Response Assessment
Detection and Response Assessment Outcomes
Blue Team had many chances to see what we did. What did they
actually see?
1. Ascertain timeline of detected events
Detection and Response Assessment Outcomes
Blue Team had many chances to see what we did. What did they
actually see?
1. Ascertain timeline of detected events
2. How repeatable was the detection method and response?
3. Formal reporting to stakeholders
4. Tools and techniques used in response
5. Lessons learned
Detection and Response Assessment Outcomes
1. Attempt to identify weaknesses in people, processes and
most importantly technology which is constraining the
detection process
2. Identify areas of strength and significant capability
3. Work together to implement and test these changes
Conclusion
Conclusion
• Test people processes and technology
• Test Blue Teams ability to respond to a threat
• Not a replacement for penetration testing
• Assurance activities should be continuous
• Improve security posture
Thank You
INTENTIONALLY BLANK
TITLE
Insert content
Insert Content
• Insert Content
Purpose of a Red Team Engagement
Holistically test your organisation against a real world breach scenario
Strong / Weak
Security Posture
PROCESS
PEOPLE
TECHNOLOGY
56
• Measure IR/EDR Capability (Blue Team)
• Focus on Depth and not Breadth
• Driven from Real World Threats
External Threat: Acting on Objectives
Why is Red Teaming Important?
A few examples where People, Process, and Technology fell down…
58

More Related Content

PDF
Adversary Emulation - Red Team Village - Mayhem 2020
PPTX
Ethical Hacking - Red Team vs Blue Team.pptx
PPTX
Using IOCs to Design and Control Threat Activities During a Red Team Engagement
PDF
Red Team Assessment Services What Are They and Why Your Company Needs Them.pdf
PPTX
ITD BSides PDX Slides
PPTX
Red team Engagement
PDF
Adversary Emulation and Red Team Exercises - EDUCAUSE
PDF
Cliffnotes on Blue Teaming
Adversary Emulation - Red Team Village - Mayhem 2020
Ethical Hacking - Red Team vs Blue Team.pptx
Using IOCs to Design and Control Threat Activities During a Red Team Engagement
Red Team Assessment Services What Are They and Why Your Company Needs Them.pdf
ITD BSides PDX Slides
Red team Engagement
Adversary Emulation and Red Team Exercises - EDUCAUSE
Cliffnotes on Blue Teaming

Similar to When is a Red Team a Red Team (20)

PPTX
[HUN][hackersuli] Red Teaming alapok 2024
PDF
[cb22] Keynote: Underwhelmed: Making Sense of the Overwhelming Challenge of C...
PPTX
Purple Teaming - The Collaborative Future of Penetration Testing
PDF
GAM 2021 - Aligning Audits with Leadership Cybersecurity Questions.pdf
PPTX
Purple Team - Work it out: Organizing Effective Adversary Emulation Exercises
PPTX
ISACA GTACS 2018 - Red Teaming for Enterprise
PDF
External Threat Hunters are Red Teamers
PDF
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
PDF
Why Is Threat Intelligence the Key to Effective Pentesting and Red Teaming
PPTX
Adversary Emulation - DerpCon
PDF
So you want to be a red teamer
PDF
Building a Successful Internal Adversarial Simulation Team - Chris Gates & Ch...
PDF
2020 11-15 marcin ludwiszewski - purple, red, blue and others - rainbow team...
PPTX
Evolution of offensive assessments
PPTX
Adversarial Emulation and the C2 Matrix - Presented at Wild West Hackin Fest ...
PPTX
RED Team Assessment | Cyber Audit | Cyber Security Expert- 2023
PDF
Red Team Assessment | Cyber Security - 2023.pdf
PDF
Purple Team Use Case - Security Weekly
PDF
PPTX
Adversarial Emulation with the C2 Matrix - Wild West WebCastin Fest
[HUN][hackersuli] Red Teaming alapok 2024
[cb22] Keynote: Underwhelmed: Making Sense of the Overwhelming Challenge of C...
Purple Teaming - The Collaborative Future of Penetration Testing
GAM 2021 - Aligning Audits with Leadership Cybersecurity Questions.pdf
Purple Team - Work it out: Organizing Effective Adversary Emulation Exercises
ISACA GTACS 2018 - Red Teaming for Enterprise
External Threat Hunters are Red Teamers
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
Why Is Threat Intelligence the Key to Effective Pentesting and Red Teaming
Adversary Emulation - DerpCon
So you want to be a red teamer
Building a Successful Internal Adversarial Simulation Team - Chris Gates & Ch...
2020 11-15 marcin ludwiszewski - purple, red, blue and others - rainbow team...
Evolution of offensive assessments
Adversarial Emulation and the C2 Matrix - Presented at Wild West Hackin Fest ...
RED Team Assessment | Cyber Audit | Cyber Security Expert- 2023
Red Team Assessment | Cyber Security - 2023.pdf
Purple Team Use Case - Security Weekly
Adversarial Emulation with the C2 Matrix - Wild West WebCastin Fest
Ad

More from Sanjiv Kawa (6)

PDF
Black Hat USA Arsenal 2023: Abusing Microsoft SQL Server with SQLRecon
PDF
DEF CON 31 Demo Labs 2023: Abusing Microsoft SQL Server with SQLRecon
PDF
Abusing MS SQL Using SQLRecon
PPTX
The world is y0ur$: Geolocation-based wordlist generation with wordsmith
PPTX
The world is y0ur$: Geolocation-based wordlist generation with wordsmith
PPTX
Crafting tailored wordlists with Wordsmith
Black Hat USA Arsenal 2023: Abusing Microsoft SQL Server with SQLRecon
DEF CON 31 Demo Labs 2023: Abusing Microsoft SQL Server with SQLRecon
Abusing MS SQL Using SQLRecon
The world is y0ur$: Geolocation-based wordlist generation with wordsmith
The world is y0ur$: Geolocation-based wordlist generation with wordsmith
Crafting tailored wordlists with Wordsmith
Ad

Recently uploaded (20)

PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPTX
Tartificialntelligence_presentation.pptx
PDF
DP Operators-handbook-extract for the Mautical Institute
PPTX
A Presentation on Artificial Intelligence
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
August Patch Tuesday
PPTX
1. Introduction to Computer Programming.pptx
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPTX
Chapter 5: Probability Theory and Statistics
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Group 1 Presentation -Planning and Decision Making .pptx
Unlocking AI with Model Context Protocol (MCP)
Hindi spoken digit analysis for native and non-native speakers
MIND Revenue Release Quarter 2 2025 Press Release
A comparative study of natural language inference in Swahili using monolingua...
Tartificialntelligence_presentation.pptx
DP Operators-handbook-extract for the Mautical Institute
A Presentation on Artificial Intelligence
Programs and apps: productivity, graphics, security and other tools
Univ-Connecticut-ChatGPT-Presentaion.pdf
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
A novel scalable deep ensemble learning framework for big data classification...
Enhancing emotion recognition model for a student engagement use case through...
August Patch Tuesday
1. Introduction to Computer Programming.pptx
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Chapter 5: Probability Theory and Statistics

When is a Red Team a Red Team

  • 1. When is a Red Team a Red Team? M AY 2 0 1 9
  • 2. Agenda [+] Introductions 1m [+] Setting the Stage 5m [+] Tales from the Trenches 13m [+] Conclusion 1m
  • 3. > whoami • Sanjiv Kawa • Penetration Tester and Red Teamer • I Lead Nettitude's Penetration Testing Team kawabungah skahwah
  • 4. > whois Nettitude • 160 security professionals • Global presence • Significant Industry Influence
  • 7. Confusion • What is Red Teaming? • Who is it for? • What does it achieve? • Why is it important?
  • 8. The Current State of Technical Assurance
  • 9. The Current State of Technical Assurance
  • 10. What is a Red Team Engagement? PenTest+
  • 11. Purpose of a Red Team Engagement Holistically test your organization against a real world breach scenario Driven from real world threats Focus on Depth and not Breadth Exercise your Blue Team People Process Technology https://www.flaticon.com/free-icon/team_476700 https://www.flaticon.com/free-icon/settings_126472 https://www.flaticon.com/free-icon/laptop_114734
  • 12. What Does a Red Team Engagement Look Like?
  • 13. What Does a Red Team Engagement Look Like?
  • 14. What Does a Red Team Engagement Look Like?
  • 15. Why is Red Teaming Important? Exercise Your Blue Team People Process Technology
  • 16. Tales from the Trenches
  • 17. Some of our Achievements • We get to work with some awesome clients • We have an extremely high success rate in reaching objectives
  • 18. Some of our Achievements • We get to work with some awesome clients • We have an extremely high success rate in reaching objectives https://www.flaticon.com/free-icon/bank_1066122 https://www.flaticon.com/free-icon/medical-history_1685819 https://www.flaticon.com/free-icon/benefits_1369921 https://www.flaticon.com/free-icon/family_1396773
  • 19. Tales from the Trenches I’m going to walk you through a red team engagement we did for a stock exchange
  • 20. Tales from the Trenches Disclaimer: Some areas have been replaced with fictitious people, other areas are heavily redacted to protect the identity of the Client and their employees …
  • 21. Engagement Particulars Client: Large Stock Exchange Objective: Integrity of Real Time Trading System (TS) Assessment: Threat Intelligence Scenario 1: External Threat Scenario 2: Insider Threat Assessment: Detection and Response Capabilities
  • 22. Threat Intelligence Mitre ATT&CK Group ID: G0032 AKA: Lazarus Group North Korea
  • 23. Threat Intelligence: Lazarus Group Based on TI: Initial entry is going to be a targeted phish
  • 24. Threat Intelligence: Recon If I had 8 hours to chop down a tree, I would spend 6 of those hours sharpening my axe Many, many, many tools ...
  • 25. Threat Intelligence: Finding Targets to Phish • In-house developed, publicly available tool • Checks HIBP for breaches • Name, email, title, etc
  • 26. Threat Intelligence: Building Pretext • Find target employees who work with TS • Senior Trader at Stock Company • Works with TS • A+ candidate to phish!
  • 28. Threat Intelligence: Building Pretext Priority Target at Stock Exchange Position Pretext from LinkedIn 1 Rey Oakley Senior Trader Joseph Thompson – Capital Ventures 2 Mike Cortes IT Support Sarah Cho – Computer Stop 3 Karen Hayes Database Admin John Smith – DevShop 4 Stacy Chan Project Manager Mike Jacklin – Logistics R Us • Don’t stop at one, maximize your chances.
  • 29. Handover At this point, the TI Team hands over a “target pack” to the Red Team
  • 33. External Threat: Delivery and Execution • Pretext: Recruitment and Career Opportunities • Delivery: Targeted Phishing (4 users) • Objective: Impact the Integrity of TS 0 1 2 3 4 5 Users Targeted Emails Confirmed Opened Links Clicked Command and Control Obtained Targeted Phishing Statistics
  • 34. External Threat: Execution Execution? Target at Stock Exchange Position Pretext from LinkedIn ý Rey Oakley Senior Trader Joseph Thompson – Capital Ventures ý Mike Cortes IT Support Sarah Cho – Computer Stop þ Karen Hayes Database Admin John Smith – DevShop þ Stacy Chan Project Manager Mike Jacklin – Logistics R Us • Who’s workstation are we on?
  • 35. External Threat: Acting on Objectives Karen Hayes
  • 36. External Threat: Acting on Objectives þ Know where TS Lives þ Know users who access TS Karen Hayes Global File Share TS Documents Active Directory TS Users
  • 37. External Threat: Acting on Objectives Compromised Workstation Trader Workstation
  • 38. External Threat: Acting on Objectives Karen Hayes Karen Hayes Active Directory
  • 39. External Threat: Acting on Objectives Karen Hayes Karen Hayes Citrix User
  • 41. External Threat: Acting on Objectives Karen Hayes Citrix Administrator Workstation Administrator Other Citrix Servers
  • 42. External Threat: Acting on Objectives Compromised Workstation Trader Workstation
  • 43. External Threat: Acting on Objectives Compromised Workstation Trader Workstation Workstation Administrator
  • 44. External Threat: Acting on Objectives Trader Workstation
  • 48. Detection and Response Assessment Outcomes Blue Team had many chances to see what we did. What did they actually see? 1. Ascertain timeline of detected events
  • 49. Detection and Response Assessment Outcomes Blue Team had many chances to see what we did. What did they actually see? 1. Ascertain timeline of detected events 2. How repeatable was the detection method and response? 3. Formal reporting to stakeholders 4. Tools and techniques used in response 5. Lessons learned
  • 50. Detection and Response Assessment Outcomes 1. Attempt to identify weaknesses in people, processes and most importantly technology which is constraining the detection process 2. Identify areas of strength and significant capability 3. Work together to implement and test these changes
  • 52. Conclusion • Test people processes and technology • Test Blue Teams ability to respond to a threat • Not a replacement for penetration testing • Assurance activities should be continuous • Improve security posture
  • 56. Purpose of a Red Team Engagement Holistically test your organisation against a real world breach scenario Strong / Weak Security Posture PROCESS PEOPLE TECHNOLOGY 56 • Measure IR/EDR Capability (Blue Team) • Focus on Depth and not Breadth • Driven from Real World Threats
  • 57. External Threat: Acting on Objectives
  • 58. Why is Red Teaming Important? A few examples where People, Process, and Technology fell down… 58