SlideShare a Scribd company logo
Cliffnotes
on
Blue Teaming
Rishabh Dangwal
admin@theprohack.com
March 2019
Welcome fellow defender, you are on the holy task of defeating the attacker(s).
Welcome!
This is you
btw!
This is the
attacker!
Yup, here they come.
Welcome!
Welp!
Welcome!
Mind the gaps please..
Welcome!
It’s worse in
actual scenarios!
News Flash
Being an incident response team member/ Blue teamer is a less
glamorous job
 Some times it’s lack of tools
 Some times it’s incomplete tactics
 Some times it’s fractured teams
 Some times it’s lack of morale
 Some times it’s lack of budgets
 Some times it’s the management
 Some times it’s the broken coffee machine in the corner
And you still take the brunt of not saving the day
(almost all the time)
: [
Be the coolest blue team on the map
 Identify areas of weakness and ways of exploitation
 Document and demonstrate consequences
 Participate in remediating risk associated with
exploitation
 Patch, Monitor, Respond
Stay cool as heck
Squad Goals!
 Every one knows about Red Teaming. Every one else is
selling it as well.
 Aeons back when I started my career, a simple Pentest
would have sufficed.
 What changed?
Attack simulation capability is useless without a
tailored defense strategy.
 Blue Teaming? Blue what?
The Story So Far
 Red Teams would be simulated aggressors with tools and
abilities
 Blue team leveraged established tactics, tools,
policies, and procedures
 Capture pre-defined positions on the map
(flags – single, multiple with different objectives)
The Ways of Military
• Create an Internal Red Team which is typically a glorified
internal security team.
 Reasons?
 Undefined metrics
 Not enough metrics
 Undefined objectives
 Increased Tech debt
 Lack of appropriate documentation
 Undefined protocols and procedures
 Simulation of advanced attacks while failing at basics
 Is typically a glorified VA/ PT exercise
 May not align to the objectives and success of the
organization
Blue Team? Nah, let our IT team take care of everything.
Organizations Get Inspired
NiceTry had a security team as well, failed to patch lolz
issue
 Most organizations fail at security basics
 Slow adoption rate with respect to security issues
 Try telling an organization that they need to address
some basic issues : ]
 No introspection unless regulators are involved
 Or incidents occur
 Or both
Heard this story before?
Organizations Get tangled
redacted redacted
Unfortunately, Blue team is overhead
 They don’t make the company money and are an
expense to maintain
 Also, no one listens to them unless the auditor
comes in
 What they recommend is typically expensive to
implement
 Partially because security is hard to quantify
Blue Team Reality Check
 Establish a charter
 Market your team like insurance
 Identify best tactics for your environment
So, what to do?
Get something like this :
Proposed Unified Framework
Red Team Blue Team
Threat Intelligence Management
Research
Monitoring
Infrastructure
Establish Charter Collaborate Define Requirements
Define Metrics &
Timelines
Identify Resources Get Approvals Simulate Report
Update
Compliance
Ofcourse compliance sucks but it saves you from a lot of lawsuits!
 The Big Stick Principle
 Occam’s Razor
 Hanlon’s Razor
 Shannon’s Maxim
 Pareto’s Principle
 Follow the Money
 Hitchen’s Razor
 Bonus : Newton’s Flaming Sword
Your Principles are Your Keystone
 Essentials
 Hardening
 Tuning & Evaluation
 Monitoring
 Testing
 Response
Ofcourse this is not exhaustive
Tactics
Get a network diagram first & establish a knowledge base
of known attack surfaces
 Threat Modelling
 Identify a framework that works for you
 OSINT
 Implement a capable monitoring system
Create an agreed format of response
 Align with established policies
Get management on board
 Make them a stakeholder
 Identify folks who are SMEs, can communicate issues
to leadership
 Champions of security culture, compliance and
real change
Tactics : Essentials
Ofcourse this is not exhaustive
No brainer, right?
 Checklists (CIS/ DOD/ et al)
 Golden images (harden them)
 LoJack? (sketchy!)
 Time stuff (see how long it takes to image/ re-image
a system)
 Optimize (LAN? NAS? SAN?)
Focus on something that is Quick, Repeatable and
Explainable
Tactics : Hardening
Ofcourse this is not exhaustive
See what is inside your network
 Systems – metadata leakage, traffic snapshots
 Services & Processes – ports they are talking to,
files being created
 Visualize your AD (Bloodhound in reverse)
 Create relevant alerts (powershell exec, event
logging, sysmon) and use cases on SIEM
 Lock down everything (admin creds, implement LAPS,
EMET, remove sysvol, disable unauth Dcsync et al)
 Create alerts for atleast MITRE ATT&CK framework
 Create playbooks
 Procedures
 Defensive tactics
 Response plan
Tactics : Tuning & Evaluation
Ofcourse this is not exhaustive
Reusing the most overused line here
“The quieter you become, the more you are able to
hear”
Identify, observe and document your
 Network baseline traffic
 DC traffic
 Privileged Logins
 Normal logins
 Application behavior
 Et al
Tactics : Monitoring
Ofcourse this is not exhaustive
Go nuts!
 VA/ PT
 Red Teaming
 Adversarial Simulation
 Whiteboard/ Tabletop exercise
 CTF
 Fail, fail first, fail early
Scope
 Hardware & Software
 Cloud & Mobile
 Containers & Processes
 Everything!
Tactics : Testing
Always convey exercise results to :
 Leadership
 Detection team
 Response team
 Infrastructure/network team
 HR for training opportunities
Ofcourse this is not exhaustive
Simulate established procedures and compare
results, prepare
 Vulnerability Announcements
 Media excerpts
 Breach Announcements/ PR Speeches
Simulate with stakeholders
 Chain of command
 Write Reports (The most important skill
you will learn, ever)
 Methods of communication
 Crisis response
Have retainer contracts in place
 Cyber Response
 Cyber Insurance
Tactics : Response
Ofcourse this is not exhaustive
 Stay one step ahead
 Identify, Establish, Grok, Simulate, practice, practice practice
 Read
 Fail, fail early, fail first
• Be a Cool Blue Team!
Summary
Questions?
 T3h internets
 Required Reading
 BTFM
 MITRE ATT&CK Framework
References & Acknowledgements
Standard Disclaimer : All images used are creative commons licensed (wherever
possible). Information Compiled from multiple sources as part of my own study on the
subject. We stand on the shoulders of giants.
Thank You!
Now go on Tiger, I will be rooting
for you!
Put a static route towards admin@theprohack.com in case of
additional queries

More Related Content

What's hot

Overview of Statistical Terms and Concepts with Matt Hansen at StatStuff
Overview of Statistical Terms and Concepts with Matt Hansen at StatStuffOverview of Statistical Terms and Concepts with Matt Hansen at StatStuff
Overview of Statistical Terms and Concepts with Matt Hansen at StatStuff
Matt Hansen
 
BSidesSF talk: Overcoming obstacles in operationalizing security
BSidesSF talk: Overcoming obstacles in operationalizing securityBSidesSF talk: Overcoming obstacles in operationalizing security
BSidesSF talk: Overcoming obstacles in operationalizing security
Rafae Bhatti
 
200603 future it-professionals
200603 future it-professionals200603 future it-professionals
200603 future it-professionals
Hari Prasad
 
Human Factor Safety Decomposed
Human Factor Safety DecomposedHuman Factor Safety Decomposed
Human Factor Safety Decomposed
Artur Marek Maciąg
 

What's hot (6)

Overview of Statistical Terms and Concepts with Matt Hansen at StatStuff
Overview of Statistical Terms and Concepts with Matt Hansen at StatStuffOverview of Statistical Terms and Concepts with Matt Hansen at StatStuff
Overview of Statistical Terms and Concepts with Matt Hansen at StatStuff
 
Dar Training
Dar TrainingDar Training
Dar Training
 
BSidesSF talk: Overcoming obstacles in operationalizing security
BSidesSF talk: Overcoming obstacles in operationalizing securityBSidesSF talk: Overcoming obstacles in operationalizing security
BSidesSF talk: Overcoming obstacles in operationalizing security
 
200603 future it-professionals
200603 future it-professionals200603 future it-professionals
200603 future it-professionals
 
Human Factor Safety Decomposed
Human Factor Safety DecomposedHuman Factor Safety Decomposed
Human Factor Safety Decomposed
 
Make_a_PM_Resolution_for_2007
Make_a_PM_Resolution_for_2007Make_a_PM_Resolution_for_2007
Make_a_PM_Resolution_for_2007
 

Similar to Cliffnotes on Blue Teaming

Congratulations! You're The New Security Person! (or, I've Made a Huge Mistake)
Congratulations! You're The New Security Person! (or, I've Made a Huge Mistake)Congratulations! You're The New Security Person! (or, I've Made a Huge Mistake)
Congratulations! You're The New Security Person! (or, I've Made a Huge Mistake)
Sean Jackson
 
2022 Subsistence Agile - Sustainability and Self-Sufficiency for Thriving Tea...
2022 Subsistence Agile - Sustainability and Self-Sufficiency for Thriving Tea...2022 Subsistence Agile - Sustainability and Self-Sufficiency for Thriving Tea...
2022 Subsistence Agile - Sustainability and Self-Sufficiency for Thriving Tea...
Cheryl M Hammond
 
Business Continuity Overview
Business Continuity OverviewBusiness Continuity Overview
Business Continuity Overview
Patrick Cowan
 
Enterprise incident response 2017
Enterprise incident response   2017Enterprise incident response   2017
Enterprise incident response 2017
zapp0
 
DeltaV Security - Don’t Let Your Business Be Caught Without It
DeltaV Security - Don’t Let Your Business Be Caught Without ItDeltaV Security - Don’t Let Your Business Be Caught Without It
DeltaV Security - Don’t Let Your Business Be Caught Without It
Emerson Exchange
 
Purple Teaming - The Collaborative Future of Penetration Testing
Purple Teaming - The Collaborative Future of Penetration TestingPurple Teaming - The Collaborative Future of Penetration Testing
Purple Teaming - The Collaborative Future of Penetration Testing
FRSecure
 
[cb22] Keynote: Underwhelmed: Making Sense of the Overwhelming Challenge of C...
[cb22] Keynote: Underwhelmed: Making Sense of the Overwhelming Challenge of C...[cb22] Keynote: Underwhelmed: Making Sense of the Overwhelming Challenge of C...
[cb22] Keynote: Underwhelmed: Making Sense of the Overwhelming Challenge of C...
CODE BLUE
 
Sea spin5 2013
Sea spin5 2013Sea spin5 2013
Sea spin5 2013Jeff Smith
 
Enterprise security incident management
Enterprise security incident managementEnterprise security incident management
Enterprise security incident management
zapp0
 
Enterprise security management II
Enterprise security management   IIEnterprise security management   II
Enterprise security management II
zapp0
 
Security crashcourse openwest_2019
Security crashcourse openwest_2019Security crashcourse openwest_2019
Security crashcourse openwest_2019
Sean Jackson
 
Terry White
Terry WhiteTerry White
Terry White
abneru
 
Светлана Старикова "Building a self-managing team: why you should not have e...
 Светлана Старикова "Building a self-managing team: why you should not have e... Светлана Старикова "Building a self-managing team: why you should not have e...
Светлана Старикова "Building a self-managing team: why you should not have e...
Fwdays
 
DBA Best Practices.ppt
DBA Best Practices.pptDBA Best Practices.ppt
DBA Best Practices.ppt
RamaKrishna320476
 
Speedbumps and Detours - Navigating Resistance to Change
Speedbumps and Detours - Navigating Resistance to ChangeSpeedbumps and Detours - Navigating Resistance to Change
Speedbumps and Detours - Navigating Resistance to Change
Emma Hamer
 
The AIDA toolkit: Assessing Institutional Digital Assets, by Ed Pinsent
The AIDA toolkit: Assessing Institutional Digital Assets, by Ed PinsentThe AIDA toolkit: Assessing Institutional Digital Assets, by Ed Pinsent
The AIDA toolkit: Assessing Institutional Digital Assets, by Ed Pinsent
JISC KeepIt project
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Mark Simos
 
Offshore Infrastructure Support
Offshore Infrastructure SupportOffshore Infrastructure Support
Offshore Infrastructure Support
Uday Thatte
 
Test Automation in Agile: A Successful Implementation
Test Automation in Agile: A Successful ImplementationTest Automation in Agile: A Successful Implementation
Test Automation in Agile: A Successful Implementation
TechWell
 
Red Team Operations: Attack and Think Like a Criminal
Red Team Operations: Attack and Think Like a CriminalRed Team Operations: Attack and Think Like a Criminal
Red Team Operations: Attack and Think Like a Criminal
Infosec
 

Similar to Cliffnotes on Blue Teaming (20)

Congratulations! You're The New Security Person! (or, I've Made a Huge Mistake)
Congratulations! You're The New Security Person! (or, I've Made a Huge Mistake)Congratulations! You're The New Security Person! (or, I've Made a Huge Mistake)
Congratulations! You're The New Security Person! (or, I've Made a Huge Mistake)
 
2022 Subsistence Agile - Sustainability and Self-Sufficiency for Thriving Tea...
2022 Subsistence Agile - Sustainability and Self-Sufficiency for Thriving Tea...2022 Subsistence Agile - Sustainability and Self-Sufficiency for Thriving Tea...
2022 Subsistence Agile - Sustainability and Self-Sufficiency for Thriving Tea...
 
Business Continuity Overview
Business Continuity OverviewBusiness Continuity Overview
Business Continuity Overview
 
Enterprise incident response 2017
Enterprise incident response   2017Enterprise incident response   2017
Enterprise incident response 2017
 
DeltaV Security - Don’t Let Your Business Be Caught Without It
DeltaV Security - Don’t Let Your Business Be Caught Without ItDeltaV Security - Don’t Let Your Business Be Caught Without It
DeltaV Security - Don’t Let Your Business Be Caught Without It
 
Purple Teaming - The Collaborative Future of Penetration Testing
Purple Teaming - The Collaborative Future of Penetration TestingPurple Teaming - The Collaborative Future of Penetration Testing
Purple Teaming - The Collaborative Future of Penetration Testing
 
[cb22] Keynote: Underwhelmed: Making Sense of the Overwhelming Challenge of C...
[cb22] Keynote: Underwhelmed: Making Sense of the Overwhelming Challenge of C...[cb22] Keynote: Underwhelmed: Making Sense of the Overwhelming Challenge of C...
[cb22] Keynote: Underwhelmed: Making Sense of the Overwhelming Challenge of C...
 
Sea spin5 2013
Sea spin5 2013Sea spin5 2013
Sea spin5 2013
 
Enterprise security incident management
Enterprise security incident managementEnterprise security incident management
Enterprise security incident management
 
Enterprise security management II
Enterprise security management   IIEnterprise security management   II
Enterprise security management II
 
Security crashcourse openwest_2019
Security crashcourse openwest_2019Security crashcourse openwest_2019
Security crashcourse openwest_2019
 
Terry White
Terry WhiteTerry White
Terry White
 
Светлана Старикова "Building a self-managing team: why you should not have e...
 Светлана Старикова "Building a self-managing team: why you should not have e... Светлана Старикова "Building a self-managing team: why you should not have e...
Светлана Старикова "Building a self-managing team: why you should not have e...
 
DBA Best Practices.ppt
DBA Best Practices.pptDBA Best Practices.ppt
DBA Best Practices.ppt
 
Speedbumps and Detours - Navigating Resistance to Change
Speedbumps and Detours - Navigating Resistance to ChangeSpeedbumps and Detours - Navigating Resistance to Change
Speedbumps and Detours - Navigating Resistance to Change
 
The AIDA toolkit: Assessing Institutional Digital Assets, by Ed Pinsent
The AIDA toolkit: Assessing Institutional Digital Assets, by Ed PinsentThe AIDA toolkit: Assessing Institutional Digital Assets, by Ed Pinsent
The AIDA toolkit: Assessing Institutional Digital Assets, by Ed Pinsent
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
Offshore Infrastructure Support
Offshore Infrastructure SupportOffshore Infrastructure Support
Offshore Infrastructure Support
 
Test Automation in Agile: A Successful Implementation
Test Automation in Agile: A Successful ImplementationTest Automation in Agile: A Successful Implementation
Test Automation in Agile: A Successful Implementation
 
Red Team Operations: Attack and Think Like a Criminal
Red Team Operations: Attack and Think Like a CriminalRed Team Operations: Attack and Think Like a Criminal
Red Team Operations: Attack and Think Like a Criminal
 

More from Rishabh Dangwal

An introduction to SwiftNET
An introduction to SwiftNETAn introduction to SwiftNET
An introduction to SwiftNET
Rishabh Dangwal
 
Introduction to layer 2 attacks & mitigation
Introduction to layer 2 attacks & mitigationIntroduction to layer 2 attacks & mitigation
Introduction to layer 2 attacks & mitigation
Rishabh Dangwal
 
Network nags - when security fails
Network nags  - when security failsNetwork nags  - when security fails
Network nags - when security fails
Rishabh Dangwal
 
Introduction to Wan Acceleration Devices
Introduction to Wan Acceleration DevicesIntroduction to Wan Acceleration Devices
Introduction to Wan Acceleration Devices
Rishabh Dangwal
 
Eigrp Cheatsheet - EIGRP in 15 min - Rishabh Dangwal - www.theprohack.com
Eigrp Cheatsheet - EIGRP in 15 min - Rishabh Dangwal - www.theprohack.comEigrp Cheatsheet - EIGRP in 15 min - Rishabh Dangwal - www.theprohack.com
Eigrp Cheatsheet - EIGRP in 15 min - Rishabh Dangwal - www.theprohack.com
Rishabh Dangwal
 
Understanding DDOS Mitigation by Rishabh Dangwal - www.theprohack.com
Understanding DDOS Mitigation by Rishabh Dangwal - www.theprohack.comUnderstanding DDOS Mitigation by Rishabh Dangwal - www.theprohack.com
Understanding DDOS Mitigation by Rishabh Dangwal - www.theprohack.com
Rishabh Dangwal
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...
Rishabh Dangwal
 
An introduction to Digital Security - Rishabh Dangwal
An introduction to Digital Security - Rishabh DangwalAn introduction to Digital Security - Rishabh Dangwal
An introduction to Digital Security - Rishabh Dangwal
Rishabh Dangwal
 
A guide to Unified Threat Management Systems (UTMs) by Rishabh Dangwal
A guide to Unified Threat Management Systems (UTMs) by Rishabh DangwalA guide to Unified Threat Management Systems (UTMs) by Rishabh Dangwal
A guide to Unified Threat Management Systems (UTMs) by Rishabh Dangwal
Rishabh Dangwal
 

More from Rishabh Dangwal (9)

An introduction to SwiftNET
An introduction to SwiftNETAn introduction to SwiftNET
An introduction to SwiftNET
 
Introduction to layer 2 attacks & mitigation
Introduction to layer 2 attacks & mitigationIntroduction to layer 2 attacks & mitigation
Introduction to layer 2 attacks & mitigation
 
Network nags - when security fails
Network nags  - when security failsNetwork nags  - when security fails
Network nags - when security fails
 
Introduction to Wan Acceleration Devices
Introduction to Wan Acceleration DevicesIntroduction to Wan Acceleration Devices
Introduction to Wan Acceleration Devices
 
Eigrp Cheatsheet - EIGRP in 15 min - Rishabh Dangwal - www.theprohack.com
Eigrp Cheatsheet - EIGRP in 15 min - Rishabh Dangwal - www.theprohack.comEigrp Cheatsheet - EIGRP in 15 min - Rishabh Dangwal - www.theprohack.com
Eigrp Cheatsheet - EIGRP in 15 min - Rishabh Dangwal - www.theprohack.com
 
Understanding DDOS Mitigation by Rishabh Dangwal - www.theprohack.com
Understanding DDOS Mitigation by Rishabh Dangwal - www.theprohack.comUnderstanding DDOS Mitigation by Rishabh Dangwal - www.theprohack.com
Understanding DDOS Mitigation by Rishabh Dangwal - www.theprohack.com
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...
 
An introduction to Digital Security - Rishabh Dangwal
An introduction to Digital Security - Rishabh DangwalAn introduction to Digital Security - Rishabh Dangwal
An introduction to Digital Security - Rishabh Dangwal
 
A guide to Unified Threat Management Systems (UTMs) by Rishabh Dangwal
A guide to Unified Threat Management Systems (UTMs) by Rishabh DangwalA guide to Unified Threat Management Systems (UTMs) by Rishabh Dangwal
A guide to Unified Threat Management Systems (UTMs) by Rishabh Dangwal
 

Recently uploaded

The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 

Recently uploaded (20)

The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 

Cliffnotes on Blue Teaming

  • 2. Welcome fellow defender, you are on the holy task of defeating the attacker(s). Welcome! This is you btw! This is the attacker!
  • 3. Yup, here they come. Welcome!
  • 5. Mind the gaps please.. Welcome!
  • 6. It’s worse in actual scenarios! News Flash
  • 7. Being an incident response team member/ Blue teamer is a less glamorous job  Some times it’s lack of tools  Some times it’s incomplete tactics  Some times it’s fractured teams  Some times it’s lack of morale  Some times it’s lack of budgets  Some times it’s the management  Some times it’s the broken coffee machine in the corner And you still take the brunt of not saving the day (almost all the time) : [
  • 8. Be the coolest blue team on the map  Identify areas of weakness and ways of exploitation  Document and demonstrate consequences  Participate in remediating risk associated with exploitation  Patch, Monitor, Respond Stay cool as heck Squad Goals!
  • 9.  Every one knows about Red Teaming. Every one else is selling it as well.  Aeons back when I started my career, a simple Pentest would have sufficed.  What changed? Attack simulation capability is useless without a tailored defense strategy.  Blue Teaming? Blue what? The Story So Far
  • 10.  Red Teams would be simulated aggressors with tools and abilities  Blue team leveraged established tactics, tools, policies, and procedures  Capture pre-defined positions on the map (flags – single, multiple with different objectives) The Ways of Military
  • 11. • Create an Internal Red Team which is typically a glorified internal security team.  Reasons?  Undefined metrics  Not enough metrics  Undefined objectives  Increased Tech debt  Lack of appropriate documentation  Undefined protocols and procedures  Simulation of advanced attacks while failing at basics  Is typically a glorified VA/ PT exercise  May not align to the objectives and success of the organization Blue Team? Nah, let our IT team take care of everything. Organizations Get Inspired
  • 12. NiceTry had a security team as well, failed to patch lolz issue  Most organizations fail at security basics  Slow adoption rate with respect to security issues  Try telling an organization that they need to address some basic issues : ]  No introspection unless regulators are involved  Or incidents occur  Or both Heard this story before? Organizations Get tangled redacted redacted
  • 13. Unfortunately, Blue team is overhead  They don’t make the company money and are an expense to maintain  Also, no one listens to them unless the auditor comes in  What they recommend is typically expensive to implement  Partially because security is hard to quantify Blue Team Reality Check
  • 14.  Establish a charter  Market your team like insurance  Identify best tactics for your environment So, what to do?
  • 15. Get something like this : Proposed Unified Framework Red Team Blue Team Threat Intelligence Management Research Monitoring Infrastructure Establish Charter Collaborate Define Requirements Define Metrics & Timelines Identify Resources Get Approvals Simulate Report Update Compliance Ofcourse compliance sucks but it saves you from a lot of lawsuits!
  • 16.  The Big Stick Principle  Occam’s Razor  Hanlon’s Razor  Shannon’s Maxim  Pareto’s Principle  Follow the Money  Hitchen’s Razor  Bonus : Newton’s Flaming Sword Your Principles are Your Keystone
  • 17.  Essentials  Hardening  Tuning & Evaluation  Monitoring  Testing  Response Ofcourse this is not exhaustive Tactics
  • 18. Get a network diagram first & establish a knowledge base of known attack surfaces  Threat Modelling  Identify a framework that works for you  OSINT  Implement a capable monitoring system Create an agreed format of response  Align with established policies Get management on board  Make them a stakeholder  Identify folks who are SMEs, can communicate issues to leadership  Champions of security culture, compliance and real change Tactics : Essentials Ofcourse this is not exhaustive
  • 19. No brainer, right?  Checklists (CIS/ DOD/ et al)  Golden images (harden them)  LoJack? (sketchy!)  Time stuff (see how long it takes to image/ re-image a system)  Optimize (LAN? NAS? SAN?) Focus on something that is Quick, Repeatable and Explainable Tactics : Hardening Ofcourse this is not exhaustive
  • 20. See what is inside your network  Systems – metadata leakage, traffic snapshots  Services & Processes – ports they are talking to, files being created  Visualize your AD (Bloodhound in reverse)  Create relevant alerts (powershell exec, event logging, sysmon) and use cases on SIEM  Lock down everything (admin creds, implement LAPS, EMET, remove sysvol, disable unauth Dcsync et al)  Create alerts for atleast MITRE ATT&CK framework  Create playbooks  Procedures  Defensive tactics  Response plan Tactics : Tuning & Evaluation Ofcourse this is not exhaustive
  • 21. Reusing the most overused line here “The quieter you become, the more you are able to hear” Identify, observe and document your  Network baseline traffic  DC traffic  Privileged Logins  Normal logins  Application behavior  Et al Tactics : Monitoring Ofcourse this is not exhaustive
  • 22. Go nuts!  VA/ PT  Red Teaming  Adversarial Simulation  Whiteboard/ Tabletop exercise  CTF  Fail, fail first, fail early Scope  Hardware & Software  Cloud & Mobile  Containers & Processes  Everything! Tactics : Testing Always convey exercise results to :  Leadership  Detection team  Response team  Infrastructure/network team  HR for training opportunities Ofcourse this is not exhaustive
  • 23. Simulate established procedures and compare results, prepare  Vulnerability Announcements  Media excerpts  Breach Announcements/ PR Speeches Simulate with stakeholders  Chain of command  Write Reports (The most important skill you will learn, ever)  Methods of communication  Crisis response Have retainer contracts in place  Cyber Response  Cyber Insurance Tactics : Response Ofcourse this is not exhaustive
  • 24.  Stay one step ahead  Identify, Establish, Grok, Simulate, practice, practice practice  Read  Fail, fail early, fail first • Be a Cool Blue Team! Summary
  • 26.  T3h internets  Required Reading  BTFM  MITRE ATT&CK Framework References & Acknowledgements Standard Disclaimer : All images used are creative commons licensed (wherever possible). Information Compiled from multiple sources as part of my own study on the subject. We stand on the shoulders of giants.
  • 27. Thank You! Now go on Tiger, I will be rooting for you! Put a static route towards admin@theprohack.com in case of additional queries