SlideShare a Scribd company logo
@haydnjohnson
How to Plan a
Purple Team
Exercise!
@haydnjohnson
Haydn Johnson
◈ Security Consultant - Researcher
◈ @haydnjohnson
◈ Talks: BsidesTO, Circle City Con, HackFest, SecTor
◈ Offsec, Purple Team, Gym??
◈ http://www.slideshare.net/HaydnJohnson
Australian living in Canada
@haydnjohnson
Back to the Talk
Let’s start with the first set of slides
@haydnjohnson
Planning a Purple
Team Exercise
0
@haydnjohnson
Outline
Terminology
RedBlue
History
Lesson
Purple Team Story Time
Cyber
Exercises
@haydnjohnson
“
SOME SUN TZU Quote,
because l33t Red team
hackers
@haydnjohnson
Terminology
1
@haydnjohnson
Red Team
1
@haydnjohnson
Red Team
Vulnerability Assessment Person
Run Vuln Scanner….hey client you suck
Penetration Tester
Metasploit /MSF PRO (FTW)...hey client you suck
@haydnjohnson
Red Team
Red Teaming
Phish, move laterally, find “sensitive stuff”, maybe
custom implant...hey client you suck
@haydnjohnson
Blue Team
1
@haydnjohnson
Blue Team
◈Support
◈Firewalls | Blinky Boxes
◈Threat Intel
@haydnjohnson
◈ Identify
◈ Confirm
◈ Respond
Blue Team
◈ Mitigate
◈ Remove
◈ Improve
@haydnjohnson
Purple Team
1
@haydnjohnson
Purple Team
Togetherness
@haydnjohnson
Purple Team
Togetherness
@haydnjohnson
Purple Team
◈Red and Blue working Together
◈Symbiotic
◈Beneficial
@haydnjohnson
Purple Team
Working together to achieve the ultimate goal of
making the organization more secure
◈different threats & attacker mindset
◈incident detection and response
◈policy and procedures
◈tuning of controls
Benefits
@haydnjohnson
History Lesson
Red Team Origin == #Purple Team
2
@haydnjohnson
@haydnjohnson
Red Team Origin
We (Red Team) f*cked up so badly.
We had to create a term to remind you (Blue
Team), that we are there to help you….
Not just beat you up.
@haydnjohnson
RedTeams.net - Definition
@haydnjohnson
“capabilities evolved and they turned into a force
tasked with challenging the security posture of
military bases..”
http://redteams.net/blog/2013/what-is-a-red-team
RedTeams.net - Definition
@haydnjohnson
“A key aspect of the red team operations today is
the adversarial way of thinking, the “Red Team
Mindset”. Red team members think outside the
box…”
http://redteams.net/blog/2013/what-is-a-red-team
https://blog.cobaltstrike.com/2015/04/29/2015s-red-team-tradecraft/
RedTeams.net - Defnition
@haydnjohnson
I Love Purple Team:
Collaboration.
https://blog.cobaltstrike.com/2014/11/12/adversary-simulation-becomes-a-thing/
@haydnjohnson
Red Team
@haydnjohnson
@haydnjohnson
Cyber Exercises
The foundations
3
@haydnjohnson
Objectives
Foundation
Cyber Exercises
@haydnjohnson
Outcomes
Cyber Exercises
Foundation
@haydnjohnson
Event / Injects
Events - generally executed by the Red Team to
elicit responses from the Blue Team in specific
phases, focused on the objectives of the exercise.
Cyber Exercises
Terms
@haydnjohnson
Cyber Exercises
Teams
3
@haydnjohnson
Cyber Exercises
Teams
RED BLUE
GREYECG
@haydnjohnson
ECG
Grey Cell
Director
Team Lead
Eyes and Ears
Cyber ExercisesGREY
@haydnjohnson
Green Cell
GREY
IR Manager
Team Lead
Director
Cyber ExercisesECG
@haydnjohnson
Cyber Exercises
Phases
3
@haydnjohnson
Cyber Exercises
◈Plan
Phases
◈Execution ◈Lessons Learned
https://www.mitre.org/sites/default/files/publications/pr_14-3929-cyber-exercise-playbook.pdf
@haydnjohnson
Cyber Exercises
Planning
Preliminary
Meeting
Middle
Meeting (s)
Final
Meeting
@haydnjohnson
Cyber Exercises
Planning
◈Concept Meeting
◈Brainstorming
◈Sticky notes!
@haydnjohnson
Cyber Exercises
Ideas
◈ Visibility
◈ Test assumption
◈ Budget
◈ Initial Weakness
◈ New technology
◈ New Team
@haydnjohnson
Cyber Exercises
Planning
https://www.fireeye.com/blog/threat-research/2014/10/apt28-a-window-into-russias-
cyber-espionage-operations.html
@haydnjohnson
@haydnjohnson
Cyber Exercises
Planning
◈ Middle Planning
Meetings
◈Action Items
◈Accountability
@haydnjohnson
Cyber Exercises
Ideas
◈Prevent confusion
◈Finalize Objectives
◈Preliminary recon
◈Who to involve
◈Use Case
◈Training Required
@haydnjohnson
Cyber Exercises
Planning
◈ Final stage Meetings
◈Cross the T’s
◈Dot the I’s
@haydnjohnson
Cyber Exercises
Ideas
@haydnjohnson
Cyber Exercises
Ideas
@haydnjohnson
Cyber Exercises
Outcomes
@haydnjohnson
Cyber Exercises
Execution
Execute the exercise
Observe, observe, observe!
@haydnjohnson
Exercise
Control
Group
Red
Team
Training
Audience
Observers
RT tasked
with action
1
@haydnjohnson
Exercise
Control
Group
Red
Team
Training
Audience
Observers
RT tasked
with action
1
Execute Inject
/Event
2
@haydnjohnson
Exercise
Control
Group
Red
Team
Training
Audience
Observers
RT tasked
with action
1
Execute Inject
/Event
2
Collects
information
3
@haydnjohnson
Exercise
Control
Group
Red
Team
Training
Audience
Observers
RT tasked
with action
1
Execute Inject
/Event
2
Collects
information
3
4
Feedback to ECG
@haydnjohnson
Exercise
Control
Group
Red
Team
Training
Audience
Observers
RT tasked
with action
1
Execute Inject
/Event
2
Collects
information
3
Tasked with
action
4
Feedback to ECG
@haydnjohnson
Cyber Exercises
Execution
No alerts
No response
GREY
@haydnjohnson
Exercise
Control
Group
Red
Team
Training
Audience
Observers
!Check for
Domain hackers.fu
@haydnjohnson
Exercise
Control
Group
Red
Team
Training
Audience
Observers
Check for
AV log / alert for mal.exe
!
@haydnjohnson
Cyber Exercises
Execution
Follow through on
planning
@haydnjohnson
Cyber Exercises
Execution
Take Note:
How is the team responding
What problems ?
Bottlenecks?
@haydnjohnson
Cyber Exercises
Lessons Learned
What observations were made during the
exercise.
What went well… or what didn’t
Positive and negative - constructive
@haydnjohnson
Bad
Good
Exercise
Follow-upImprovements
@haydnjohnson
Exercise
Control
Group
Red
Team
Training
Audience
Observers
Collect information
Strengthen future exercises
@haydnjohnson
Purple Team It
Planning
4
@haydnjohnson
Purple Team it
Start Small
Do not bite off more than you can chew.
Consider :
Funding / Budget
Support
Skills
Technology
@haydnjohnson
Purple Team it
What do you have
Is your security budget YUUGE?
Do you have threat hunting? It’s the best.
Do you have a blinky box! Sad!
@haydnjohnson
Purple Team It
SDLC / Security Program
Is it mature?
Is there one?
What things annoy the team?
@haydnjohnson
Purple Team It
The paper based one
Example:
Testing Processes
@haydnjohnson
Purple Team It
Testing Processes
Temporary Access Card
@haydnjohnson
Purple Team It
Testing Processes
What is required to get one
A signature?
Evidence of identity
@haydnjohnson
Purple Team It
Testing Processes
What if it is not approved?
Fake signature?
@haydnjohnson
Purple Team It
Testing Processes
Ask questions
If an employee loses a card, what
happens.
@haydnjohnson
Purple Team It
Testing Processes
Red Team It
Try to get a pass without approval
Not the normal process
@haydnjohnson
Purple Team It
Start with the Basics
Example:
Detecting Port Scanning
https://www.safaribooksonline.com/library/view/snort-cookbook/0596007914/ch04s06.html
@haydnjohnson
Purple Team It
Port Scanning
Pentester run Nmap internally…
Can be that simple!
@haydnjohnson
Purple Team It
Port Scanning
◈Increase in complexity
◈Slower scan
◈Fragmented scan
@haydnjohnson
@haydnjohnson
Purple Team It
Nmap - u wot m8?
But APT!
APT won’t use NMAP
It is a start
Tests current
technology
Simple
Relatively cheap
@haydnjohnson
Try - PowerShell
Purple Team It
@haydnjohnson
Purple Team It
Example:
Restricted Desktop Environments
https://www.safaribooksonline.com/library/view/snort-cookbook/0596007914/ch04s06.html
@haydnjohnson
Purple Team it
Restricted Desktop Environments
Organisations have lost control of their data
@haydnjohnson
https://technet.microsoft.com/en-us/library/bb457006.aspx#ENAA
secpol.msc
@haydnjohnson
https://technet.microsoft.com/en-
us/library/bb457006.aspx#ENAA
@haydnjohnson
Restrict Drives!
@haydnjohnson
Restrict Drives!
@haydnjohnson
No C Drive!
@haydnjohnson
Full Path
@haydnjohnson
Run cmd.exe
@haydnjohnson
cmd 4 u
@haydnjohnson
Prevent cmd.exe access directly
@haydnjohnson
No CMD 4 u
@haydnjohnson
Purple Team It
Example:
Applocker
@haydnjohnson
LSP for everyone
@haydnjohnson
Applocker Enabled
@haydnjohnson
Payload Blocked
@haydnjohnson
Compile with .Net on Host
csc.exe /unsafe /platform:x86 /out:bp2.exe
.beaconPayload.cs
@haydnjohnson
Execute with InstallUtil on Host
Installutil.exe /logfile= /logtoconsole=false /U .bp.exe
@haydnjohnson
Receive connection
@haydnjohnson
Purple Team
Ideas
People Process Technology
Skillset
Mean time to
detection
Use of Tools
Attacker mindset
Paperwork
Reporting
Escalation
Firewall
Anti Virus
Whitelisting
TTP Pyramid of pain
@haydnjohnson
STORY TIME
BANK RED TEAM
4
@haydnjohnson @carnal0wnage
Story Time
Privilege
Escalation
Assume
Breach
Meterpreter
C2
Exfiltration -
FTP
“Red Team” @ $canadian Bank
@haydnjohnson @carnal0wnage
Story Time
Receive call “Check this IP address”
$secretpoliceinvestigation
IP address seen - Investigators go to meeting + lunch
2 hours later, identify data exfil
Sh*t hits fan
Log into FTP server to delete data
Execute processes
Alerts triggered purposely
@haydnjohnson @carnal0wnage
Story Time
Debrief
Red TeamBlue Team
What we
saw
What was
done
The
GAP
Improvements
==
@haydnjohnson @carnal0wnage
Story Time
Process not as
effective as it looks
Road Blocks in
communication
Lessons learned
@haydnjohnson @carnal0wnage
Story Time
Process bypassed
Hard to collaborate
Rotating Shifts
Lessons learned
@haydnjohnson @carnal0wnage
Story Time
IR equipment == slow
Infrastructure out of
date
Lessons learned
@haydnjohnson @carnal0wnage
Story Time
Big company hard to change quickly
Issues clearly acknowledged
Long term plans
Nothing changed in short term
@haydnjohnson @carnal0wnage
Story Time
Create defined and clear process for hierarchy
Training on hacking back - DON’T
Budget for prioritized upgrade of Lab
Shift style lunches
Solutions
@haydnjohnson
Conclusion
5
Almost the end
@haydnjohnson
Purple Team it
What to take away
Don’t assume
Be proactive
Take action
@haydnjohnson
Purple Team it
Thank you
Debate, discuss, questions
Now | Afterwards I Twitter | Pub
@haydnjohnson
@haydnjohnson
References
◈https://medium.com/@lennartkoopmann/explain
ing-and-adapting-tays-sysmon-configuration-
27d9719a89a8#.fsvuszvp3

More Related Content

What's hot

Purple Team Use Case - Security Weekly
Purple Team Use Case - Security WeeklyPurple Team Use Case - Security Weekly
Purple Team Use Case - Security Weekly
Jorge Orchilles
 
Purple Team - Work it out: Organizing Effective Adversary Emulation Exercises
Purple Team - Work it out: Organizing Effective Adversary Emulation ExercisesPurple Team - Work it out: Organizing Effective Adversary Emulation Exercises
Purple Team - Work it out: Organizing Effective Adversary Emulation Exercises
Jorge Orchilles
 
Threat-Based Adversary Emulation with MITRE ATT&CK
Threat-Based Adversary Emulation with MITRE ATT&CKThreat-Based Adversary Emulation with MITRE ATT&CK
Threat-Based Adversary Emulation with MITRE ATT&CK
Katie Nickels
 
Adversary Emulation - Red Team Village - Mayhem 2020
Adversary Emulation - Red Team Village - Mayhem 2020Adversary Emulation - Red Team Village - Mayhem 2020
Adversary Emulation - Red Team Village - Mayhem 2020
Jorge Orchilles
 
SANS Purple Team Summit 2021: Active Directory Purple Team Playbooks
SANS Purple Team Summit 2021: Active Directory Purple Team PlaybooksSANS Purple Team Summit 2021: Active Directory Purple Team Playbooks
SANS Purple Team Summit 2021: Active Directory Purple Team Playbooks
Mauricio Velazco
 
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
MITRE - ATT&CKcon
 
8.8 Las Vegas - Adversary Emulation con C2 Matrix
8.8 Las Vegas - Adversary Emulation con C2 Matrix8.8 Las Vegas - Adversary Emulation con C2 Matrix
8.8 Las Vegas - Adversary Emulation con C2 Matrix
Jorge Orchilles
 
Purple Teaming with ATT&CK - x33fcon 2018
Purple Teaming with ATT&CK - x33fcon 2018Purple Teaming with ATT&CK - x33fcon 2018
Purple Teaming with ATT&CK - x33fcon 2018
Christopher Korban
 
BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status Quo
BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status QuoBSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status Quo
BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status Quo
Katie Nickels
 
Red Team Framework
Red Team FrameworkRed Team Framework
Red Team Framework
👀 Joe Gray
 
Putting MITRE ATT&CK into Action with What You Have, Where You Are
Putting MITRE ATT&CK into Action with What You Have, Where You ArePutting MITRE ATT&CK into Action with What You Have, Where You Are
Putting MITRE ATT&CK into Action with What You Have, Where You Are
Katie Nickels
 
Introduction to red team operations
Introduction to red team operationsIntroduction to red team operations
Introduction to red team operations
Sunny Neo
 
Red team and blue team in ethical hacking
Red team and blue team in ethical hackingRed team and blue team in ethical hacking
Red team and blue team in ethical hacking
Vikram Khanna
 
Knowledge for the masses: Storytelling with ATT&CK
Knowledge for the masses: Storytelling with ATT&CKKnowledge for the masses: Storytelling with ATT&CK
Knowledge for the masses: Storytelling with ATT&CK
MITRE ATT&CK
 
Cyber Threat hunting workshop
Cyber Threat hunting workshopCyber Threat hunting workshop
Cyber Threat hunting workshop
Arpan Raval
 
ATT&CKing with Threat Intelligence
ATT&CKing with Threat IntelligenceATT&CKing with Threat Intelligence
ATT&CKing with Threat Intelligence
Christopher Korban
 
Building an InfoSec RedTeam
Building an InfoSec RedTeamBuilding an InfoSec RedTeam
Building an InfoSec RedTeam
Dan Vasile
 
Red Team vs. Blue Team
Red Team vs. Blue TeamRed Team vs. Blue Team
Red Team vs. Blue Team
EC-Council
 
Adversary Emulation - DerpCon
Adversary Emulation - DerpConAdversary Emulation - DerpCon
Adversary Emulation - DerpCon
Jorge Orchilles
 
MITRE ATT&CKcon 2.0: Lessons in Purple Team Testing with MITRE ATT&CK; Daniel...
MITRE ATT&CKcon 2.0: Lessons in Purple Team Testing with MITRE ATT&CK; Daniel...MITRE ATT&CKcon 2.0: Lessons in Purple Team Testing with MITRE ATT&CK; Daniel...
MITRE ATT&CKcon 2.0: Lessons in Purple Team Testing with MITRE ATT&CK; Daniel...
MITRE - ATT&CKcon
 

What's hot (20)

Purple Team Use Case - Security Weekly
Purple Team Use Case - Security WeeklyPurple Team Use Case - Security Weekly
Purple Team Use Case - Security Weekly
 
Purple Team - Work it out: Organizing Effective Adversary Emulation Exercises
Purple Team - Work it out: Organizing Effective Adversary Emulation ExercisesPurple Team - Work it out: Organizing Effective Adversary Emulation Exercises
Purple Team - Work it out: Organizing Effective Adversary Emulation Exercises
 
Threat-Based Adversary Emulation with MITRE ATT&CK
Threat-Based Adversary Emulation with MITRE ATT&CKThreat-Based Adversary Emulation with MITRE ATT&CK
Threat-Based Adversary Emulation with MITRE ATT&CK
 
Adversary Emulation - Red Team Village - Mayhem 2020
Adversary Emulation - Red Team Village - Mayhem 2020Adversary Emulation - Red Team Village - Mayhem 2020
Adversary Emulation - Red Team Village - Mayhem 2020
 
SANS Purple Team Summit 2021: Active Directory Purple Team Playbooks
SANS Purple Team Summit 2021: Active Directory Purple Team PlaybooksSANS Purple Team Summit 2021: Active Directory Purple Team Playbooks
SANS Purple Team Summit 2021: Active Directory Purple Team Playbooks
 
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
 
8.8 Las Vegas - Adversary Emulation con C2 Matrix
8.8 Las Vegas - Adversary Emulation con C2 Matrix8.8 Las Vegas - Adversary Emulation con C2 Matrix
8.8 Las Vegas - Adversary Emulation con C2 Matrix
 
Purple Teaming with ATT&CK - x33fcon 2018
Purple Teaming with ATT&CK - x33fcon 2018Purple Teaming with ATT&CK - x33fcon 2018
Purple Teaming with ATT&CK - x33fcon 2018
 
BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status Quo
BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status QuoBSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status Quo
BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status Quo
 
Red Team Framework
Red Team FrameworkRed Team Framework
Red Team Framework
 
Putting MITRE ATT&CK into Action with What You Have, Where You Are
Putting MITRE ATT&CK into Action with What You Have, Where You ArePutting MITRE ATT&CK into Action with What You Have, Where You Are
Putting MITRE ATT&CK into Action with What You Have, Where You Are
 
Introduction to red team operations
Introduction to red team operationsIntroduction to red team operations
Introduction to red team operations
 
Red team and blue team in ethical hacking
Red team and blue team in ethical hackingRed team and blue team in ethical hacking
Red team and blue team in ethical hacking
 
Knowledge for the masses: Storytelling with ATT&CK
Knowledge for the masses: Storytelling with ATT&CKKnowledge for the masses: Storytelling with ATT&CK
Knowledge for the masses: Storytelling with ATT&CK
 
Cyber Threat hunting workshop
Cyber Threat hunting workshopCyber Threat hunting workshop
Cyber Threat hunting workshop
 
ATT&CKing with Threat Intelligence
ATT&CKing with Threat IntelligenceATT&CKing with Threat Intelligence
ATT&CKing with Threat Intelligence
 
Building an InfoSec RedTeam
Building an InfoSec RedTeamBuilding an InfoSec RedTeam
Building an InfoSec RedTeam
 
Red Team vs. Blue Team
Red Team vs. Blue TeamRed Team vs. Blue Team
Red Team vs. Blue Team
 
Adversary Emulation - DerpCon
Adversary Emulation - DerpConAdversary Emulation - DerpCon
Adversary Emulation - DerpCon
 
MITRE ATT&CKcon 2.0: Lessons in Purple Team Testing with MITRE ATT&CK; Daniel...
MITRE ATT&CKcon 2.0: Lessons in Purple Team Testing with MITRE ATT&CK; Daniel...MITRE ATT&CKcon 2.0: Lessons in Purple Team Testing with MITRE ATT&CK; Daniel...
MITRE ATT&CKcon 2.0: Lessons in Purple Team Testing with MITRE ATT&CK; Daniel...
 

Similar to How to Plan Purple Team Exercises

Purple Teaming the Cyber Kill Chain: Practical Exercises for Everyone Sector...
Purple Teaming the Cyber Kill Chain: Practical Exercises for Everyone  Sector...Purple Teaming the Cyber Kill Chain: Practical Exercises for Everyone  Sector...
Purple Teaming the Cyber Kill Chain: Practical Exercises for Everyone Sector...
Chris Gates
 
Purple teaming Cyber Kill Chain
Purple teaming Cyber Kill ChainPurple teaming Cyber Kill Chain
Purple teaming Cyber Kill Chain
Haydn Johnson
 
UOIT Purple Team - Student Edition 2017
UOIT Purple Team - Student Edition 2017UOIT Purple Team - Student Edition 2017
UOIT Purple Team - Student Edition 2017
Haydn Johnson
 
PT_OWASP_AUSTIN_2017
PT_OWASP_AUSTIN_2017PT_OWASP_AUSTIN_2017
PT_OWASP_AUSTIN_2017
Haydn Johnson
 
Faster! Faster! Accelerate your business with blazing prototypes
Faster! Faster! Accelerate your business with blazing prototypesFaster! Faster! Accelerate your business with blazing prototypes
Faster! Faster! Accelerate your business with blazing prototypes
OSCON Byrum
 
DevOps Connect: Josh Corman and Gene Kim discuss DevOpsSec
DevOps Connect: Josh Corman and Gene Kim discuss DevOpsSecDevOps Connect: Josh Corman and Gene Kim discuss DevOpsSec
DevOps Connect: Josh Corman and Gene Kim discuss DevOpsSec
Sonatype
 
What lies beneath
What lies beneathWhat lies beneath
What lies beneath
Alberto Brandolini
 
MNE group analysis presentation @ Biomag 2016 conf.
MNE group analysis presentation @ Biomag 2016 conf.MNE group analysis presentation @ Biomag 2016 conf.
MNE group analysis presentation @ Biomag 2016 conf.
agramfort
 
Purple View
Purple ViewPurple View
Purple View
Haydn Johnson
 
Purple View
Purple ViewPurple View
Purple View
Haydn Johnson
 
Software Analytics: The Dark Side and the Test Side
Software Analytics: The Dark Side and the Test SideSoftware Analytics: The Dark Side and the Test Side
Software Analytics: The Dark Side and the Test Side
Andy Zaidman
 
Open Plans User Testing Workshop
Open Plans User Testing WorkshopOpen Plans User Testing Workshop
Open Plans User Testing Workshop
Cyd Harrell
 
Remote Research Workshop, UX Week 2012 - Cyd Harrell
Remote Research Workshop, UX Week 2012 - Cyd HarrellRemote Research Workshop, UX Week 2012 - Cyd Harrell
Remote Research Workshop, UX Week 2012 - Cyd Harrell
Cyd Harrell
 
Automation of Penetration Testing
Automation of Penetration TestingAutomation of Penetration Testing
Automation of Penetration Testing
Haydn Johnson
 
Usability Testing
Usability TestingUsability Testing
Usability Testing
Andy Budd
 
Understanding and hiding your operations
Understanding and hiding your operationsUnderstanding and hiding your operations
Understanding and hiding your operations
Daniel López Jiménez
 
Going Purple : From full time breaker to part time fixer: 1 year later
Going Purple : From full time breaker to part time fixer: 1 year later Going Purple : From full time breaker to part time fixer: 1 year later
Going Purple : From full time breaker to part time fixer: 1 year later
Chris Gates
 
The Invisible Traceback
The Invisible TracebackThe Invisible Traceback
The Invisible Traceback
Mel Chua
 
Bsides to 2016-penetration-testing
Bsides to 2016-penetration-testingBsides to 2016-penetration-testing
Bsides to 2016-penetration-testing
Haydn Johnson
 
Hardware hacking and internet of things
Hardware hacking and internet of thingsHardware hacking and internet of things
Hardware hacking and internet of things
GeekNightHyderabad
 

Similar to How to Plan Purple Team Exercises (20)

Purple Teaming the Cyber Kill Chain: Practical Exercises for Everyone Sector...
Purple Teaming the Cyber Kill Chain: Practical Exercises for Everyone  Sector...Purple Teaming the Cyber Kill Chain: Practical Exercises for Everyone  Sector...
Purple Teaming the Cyber Kill Chain: Practical Exercises for Everyone Sector...
 
Purple teaming Cyber Kill Chain
Purple teaming Cyber Kill ChainPurple teaming Cyber Kill Chain
Purple teaming Cyber Kill Chain
 
UOIT Purple Team - Student Edition 2017
UOIT Purple Team - Student Edition 2017UOIT Purple Team - Student Edition 2017
UOIT Purple Team - Student Edition 2017
 
PT_OWASP_AUSTIN_2017
PT_OWASP_AUSTIN_2017PT_OWASP_AUSTIN_2017
PT_OWASP_AUSTIN_2017
 
Faster! Faster! Accelerate your business with blazing prototypes
Faster! Faster! Accelerate your business with blazing prototypesFaster! Faster! Accelerate your business with blazing prototypes
Faster! Faster! Accelerate your business with blazing prototypes
 
DevOps Connect: Josh Corman and Gene Kim discuss DevOpsSec
DevOps Connect: Josh Corman and Gene Kim discuss DevOpsSecDevOps Connect: Josh Corman and Gene Kim discuss DevOpsSec
DevOps Connect: Josh Corman and Gene Kim discuss DevOpsSec
 
What lies beneath
What lies beneathWhat lies beneath
What lies beneath
 
MNE group analysis presentation @ Biomag 2016 conf.
MNE group analysis presentation @ Biomag 2016 conf.MNE group analysis presentation @ Biomag 2016 conf.
MNE group analysis presentation @ Biomag 2016 conf.
 
Purple View
Purple ViewPurple View
Purple View
 
Purple View
Purple ViewPurple View
Purple View
 
Software Analytics: The Dark Side and the Test Side
Software Analytics: The Dark Side and the Test SideSoftware Analytics: The Dark Side and the Test Side
Software Analytics: The Dark Side and the Test Side
 
Open Plans User Testing Workshop
Open Plans User Testing WorkshopOpen Plans User Testing Workshop
Open Plans User Testing Workshop
 
Remote Research Workshop, UX Week 2012 - Cyd Harrell
Remote Research Workshop, UX Week 2012 - Cyd HarrellRemote Research Workshop, UX Week 2012 - Cyd Harrell
Remote Research Workshop, UX Week 2012 - Cyd Harrell
 
Automation of Penetration Testing
Automation of Penetration TestingAutomation of Penetration Testing
Automation of Penetration Testing
 
Usability Testing
Usability TestingUsability Testing
Usability Testing
 
Understanding and hiding your operations
Understanding and hiding your operationsUnderstanding and hiding your operations
Understanding and hiding your operations
 
Going Purple : From full time breaker to part time fixer: 1 year later
Going Purple : From full time breaker to part time fixer: 1 year later Going Purple : From full time breaker to part time fixer: 1 year later
Going Purple : From full time breaker to part time fixer: 1 year later
 
The Invisible Traceback
The Invisible TracebackThe Invisible Traceback
The Invisible Traceback
 
Bsides to 2016-penetration-testing
Bsides to 2016-penetration-testingBsides to 2016-penetration-testing
Bsides to 2016-penetration-testing
 
Hardware hacking and internet of things
Hardware hacking and internet of thingsHardware hacking and internet of things
Hardware hacking and internet of things
 

More from Haydn Johnson

Introduction to Just in Time Access - BrightTalk
Introduction to Just in Time Access - BrightTalkIntroduction to Just in Time Access - BrightTalk
Introduction to Just in Time Access - BrightTalk
Haydn Johnson
 
Communication hack fest-2018-final
Communication hack fest-2018-finalCommunication hack fest-2018-final
Communication hack fest-2018-final
Haydn Johnson
 
Kubernetes - security you need to know about it
Kubernetes - security you need to know about itKubernetes - security you need to know about it
Kubernetes - security you need to know about it
Haydn Johnson
 
Human(e) Security in a World of Business 2018
Human(e) Security in a World of Business 2018Human(e) Security in a World of Business 2018
Human(e) Security in a World of Business 2018
Haydn Johnson
 
Phishing dc618 haydnjohnson
Phishing dc618 haydnjohnsonPhishing dc618 haydnjohnson
Phishing dc618 haydnjohnson
Haydn Johnson
 
Nolacon phishing 2017_haydn_johnson
Nolacon phishing 2017_haydn_johnsonNolacon phishing 2017_haydn_johnson
Nolacon phishing 2017_haydn_johnson
Haydn Johnson
 
Blue team reboot - HackFest
Blue team reboot - HackFest Blue team reboot - HackFest
Blue team reboot - HackFest
Haydn Johnson
 
ProsVJoes - Task 2016
ProsVJoes - Task 2016ProsVJoes - Task 2016
ProsVJoes - Task 2016
Haydn Johnson
 
Empire Work shop
Empire Work shopEmpire Work shop
Empire Work shop
Haydn Johnson
 
Meterpreter awareness
Meterpreter awarenessMeterpreter awareness
Meterpreter awareness
Haydn Johnson
 
Power sploit persistence walkthrough
Power sploit persistence walkthroughPower sploit persistence walkthrough
Power sploit persistence walkthrough
Haydn Johnson
 

More from Haydn Johnson (11)

Introduction to Just in Time Access - BrightTalk
Introduction to Just in Time Access - BrightTalkIntroduction to Just in Time Access - BrightTalk
Introduction to Just in Time Access - BrightTalk
 
Communication hack fest-2018-final
Communication hack fest-2018-finalCommunication hack fest-2018-final
Communication hack fest-2018-final
 
Kubernetes - security you need to know about it
Kubernetes - security you need to know about itKubernetes - security you need to know about it
Kubernetes - security you need to know about it
 
Human(e) Security in a World of Business 2018
Human(e) Security in a World of Business 2018Human(e) Security in a World of Business 2018
Human(e) Security in a World of Business 2018
 
Phishing dc618 haydnjohnson
Phishing dc618 haydnjohnsonPhishing dc618 haydnjohnson
Phishing dc618 haydnjohnson
 
Nolacon phishing 2017_haydn_johnson
Nolacon phishing 2017_haydn_johnsonNolacon phishing 2017_haydn_johnson
Nolacon phishing 2017_haydn_johnson
 
Blue team reboot - HackFest
Blue team reboot - HackFest Blue team reboot - HackFest
Blue team reboot - HackFest
 
ProsVJoes - Task 2016
ProsVJoes - Task 2016ProsVJoes - Task 2016
ProsVJoes - Task 2016
 
Empire Work shop
Empire Work shopEmpire Work shop
Empire Work shop
 
Meterpreter awareness
Meterpreter awarenessMeterpreter awareness
Meterpreter awareness
 
Power sploit persistence walkthrough
Power sploit persistence walkthroughPower sploit persistence walkthrough
Power sploit persistence walkthrough
 

Recently uploaded

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 

Recently uploaded (20)

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 

How to Plan Purple Team Exercises