SlideShare a Scribd company logo
Tidying up your Nest
Validating ATT&CK Technique Coverage
Using EDR Telemetry
Presenters
Jesse Brown
Senior Detection Validation
Engineer
@jessecbrown
Adam Ostrich
Senior Detection Validation
Engineer
Detection Validation Team
Understand how things should work
Make sure things work like they should
Make things work better
Outline
What is EDR telemetry?
How Red Canary works
Validation of ATT&CK techniques
Automated validation workflow
Lessons learned
Outline
What is EDR telemetry?
How Red Canary works
Validation of ATT&CK techniques
Automated validation workflow
Lessons learned
What is EDR Telemetry?
Cost of collection
(Time, CPU/memory/bandwidth)
Depth
of
coverage
EDR
Telemetry
Forensic
Images
Good for hunting
System
Logs
Telemetry Types
PS > Invoke-Expression -Command "procdump -ma lsass.exe lsass.dmp"
Remote PS
Telemetry Types
PS > Invoke-Expression -Command "procdump -ma lsass.exe lsass.dmp"
Network connection
Remote PS
wsmprovhost.exe
process
Telemetry Types
File system
procdump.exe
PS > Invoke-Expression -Command "procdump -ma lsass.exe lsass.dmp"
powershell.exe
process
Script load
Process start
procdump.exe
process
Network connection
Remote PS
wsmprovhost.exe
process
Telemetry Types
File system
procdump.exe
kernel32.dll
PS > Invoke-Expression -Command "procdump -ma lsass.exe lsass.dmp"
powershell.exe
process
Script load
Process start
Module load
procdump.exe
process
Network connection
Remote PS
wsmprovhost.exe
process
Telemetry Types
File system
procdump.exe
kernel32.dll
PS > Invoke-Expression -Command "procdump -ma lsass.exe lsass.dmp"
powershell.exe
process
Script load
Process start
Module load
Windows Registry
EULA registry key
procdump.exe
process
Registry
modification
Network connection
Remote PS
wsmprovhost.exe
process
Telemetry Types
File system
lsass.exe
process
procdump.exe
kernel32.dll
PS > Invoke-Expression -Command "procdump -ma lsass.exe lsass.dmp"
powershell.exe
process
Script load
Process start
Module load
Crossproc
Windows Registry
EULA registry key
procdump.exe
process
Registry
modification
Network connection
Remote PS
wsmprovhost.exe
process
Telemetry Types
File system
lsass.exe
process
procdump.exe
kernel32.dll
PS > Invoke-Expression -Command "procdump -ma lsass.exe lsass.dmp"
lsass.dmp
powershell.exe
process
Script load
Process start
Module load
Crossproc
File create
Windows Registry
EULA registry key
procdump.exe
process
Registry
modification
Network connection
Remote PS
wsmprovhost.exe
process
Telemetry Types
File system
lsass.exe
process
procdump.exe
kernel32.dll
PS > Invoke-Expression -Command "procdump -ma lsass.exe lsass.dmp"
lsass.dmp
powershell.exe
process
Script load
Process start
Module load
Crossproc
File create
Windows Registry
EULA registry key
procdump.exe
process
APIs
Registry
modification
Network connection
Remote PS
wsmprovhost.exe
process
Telemetry Types
File system
lsass.exe
process
procdump.exe
kernel32.dll
PS > Invoke-Expression -Command "procdump -ma lsass.exe lsass.dmp"
lsass.dmp
powershell.exe
process
Script load
Process start
Module load
Crossproc
File create
Windows Registry
EULA registry key
procdump.exe
process
APIs
File open
Registry
modification
Network connection
Remote PS
wsmprovhost.exe
process
It’s JSON!
{
"event_type": "process_start",
"process_command_line": "procdump -ma lsass.exe lsass.dmp",
"process_md5": "f2091c44d89789f689d98bc244358878",
"process_name": "procdump.exe",
"process_path": "C:Sysinternalsprocdump.exe",
"process_pid": 1528,
}
Outline
What is EDR telemetry?
How Red Canary works
Validation of ATT&CK techniques
Automated validation workflow
Lessons learned
How Red Canary works (and maybe you too?)
{
"Event.type": "ProcessStart",
"Process.cmdline": "procdump -ma lsass.exe lsass.dmp",
"Process.md5": "f2091c44d89789f689d98bc244358878",
"Process.name": "procdump.exe",
"Process.path": "C:Sysinternalsprocdump.exe",
"Process.pid": 1528,
}
{
"event_type": "process_start",
"process_command_line": "procdump -ma lsass.exe lsass.dmp",
"process_md5": "f2091c44d89789f689d98bc244358878",
"process_name": "procdump.exe",
"process_path": "C:Sysinternalsprocdump.exe",
"process_pid": 1528,
}
Standardization
Native Standardized
Outline
What is EDR telemetry?
How Red Canary works
Validation of ATT&CK techniques
Automated validation workflow
Lessons learned
Validate coverage across ATT&CK techniques
Break techniques down to data components
Data component Detects
Process creation procdump -ma lsass.exe lsass.dmp
Command execution Invoke-Mimikatz
Process access API calls to OpenProcess/MiniDumpWriteDump
Process access Crossproc (e.g. open process handle)
File modification File lsass.dmp written to disk
OS Credential Dumping: LSASS Memory (T1003.001)
ATT&CK Technique Coverage by Data Component
Enterprise Techniques
So many combinations.. Oh my!
End-to-end functional testing!
Run functional test
Report expected results
Compare expected results to actual results
Analyze/detect changes in results
Outline
What is EDR telemetry?
How Red Canary works
Validation of ATT&CK techniques
Automated validation workflow
Lessons learned
Scaling Validation with Automation
1) Spin up infrastructure
2) Run tests
3) Analyze results
Architecture
1) Spin up infrastructure
Coalmine
Spin up infrastructure
○ Terraform and ansible
○ Creates/configures EC2 instances
Run tests
○ Atomic Red Team
https://github.com/redcanaryco/ansible-atomic-red-team
○ Atomic Test Harnesses
https://atomicredteam.io/atomic-test-harnesses
○ Vuvuzela
Architecture
2) Run tests
Vuvuzela (OS) data
"event_type": "process_start"
"process_command_line": "procdump -ma lsass.exe lsass.dmp"
"process_md5": "f2091c44d89789f689d98bc244358878"
"process_name": "procdump.exe"
"process_path": "C:Sysinternalsprocdump.exe"
"process_pid": 1528
Test VM
EDR sensor data
"event_type": "process_start"
"process_command_line": "procdump -ma lsass.exe lsass.dmp"
"process_md5": "f2091c44d89789f689d98bc244358878"
"process_name": "procdump.exe"
"process_path": "DeviceHarddiskVolume1Sysinternalsprocdump.exe"
"process_pid": 1529
Vuvuzela: Black box testing
procdump test
Vuvuzela
EDR sensor
Test execution
Observation
Observation Reported data
Reported data
Mismatch
Expected Results Report
Test sensor/endpoint to identify sensor data
Expected detection analytics
Expected standardized telemetry
Architecture
3) Analyze results
Telemetry Validation Lambda Function
Identify relevant engine data
Telemetry Profiling
Compare expected results
to engine data
Report results to S3 Splunk
API
Telemetry Validation Lambda Function
Identify relevant engine data
Telemetry Profiling
Compare expected results
to engine data
Report results to S3 Splunk
API
Telemetry Validation Lambda Function
Identify relevant engine data
Telemetry Profiling
Compare expected results
to engine data
Report results to S3 Splunk
API
Telemetry Validation Lambda Function
Identify relevant engine data
Telemetry Profiling
Compare expected results
to engine data
Report results to S3 Splunk
API
Valid
Skipped
Invalid
Splunk dashboard example
Field name Expected Found
process_command_lin
e
procdump -ma lsass.exe lsass.dmp procdump -ma lsass.exe lsass.dmp
process_md5 f2091c44d89789f689d98bc244358878 f2091c44d89789f689d98bc244358878
process_name procdump.exe procdump.exe
Field name Expected Found
process_sha1 db1ef4ce56820c93a3b7f1fdf36d3fffc7d1ec96
process_sha256 e4ea34a7c2b51982a6c42c6367119f34bec9aeb9a60937836540035583a5b3bc
Field name Expected Found
process_path C:Sysinternalsprocdump.exe DeviceHarddiskVolume1Sysinternalsprocdump.exe
process_pid 1528 1529
Validation APIs
Validation APIs
Outline
What is EDR telemetry?
How Red Canary works
Validation of ATT&CK techniques
Automated validation workflow
Lessons learned
Telemetry quirks
Signal/noise ratio different for each sensor
○ Lower quality telemetry (i.e. filemods & regmods) can be highly filtered
○ Filemod filtering by process, directory, and file type
File telemetry has inconsistent meaning/terminology
○ What is a filemod?
○ Creation vs. modification
Challenges of using EDR telemetry
Level of detail is limited
○ Limited insight into certain types of behaviors like API calls
○ Can’t use static binary signatures outside of a hash
○ Certain telemetry types are limited because they’re noisy
Example: Credential theft
○ Dumping lsass -> good telemetry
○ Application credential theft (e.g. browsers) -> limited/no telemetry
○ EDR sensors are good at generating alerts for this activity
Benefits of using EDR telemetry
Offloading detections from endpoints
○ Avoids limitations of analytics on endpoints
○ Highly scalable
○ Adversary can’t see alerts
Versatile representation of behavior
○ Captures context
○ Useful for correlation
Key takeaways
EDR telemetry balances signal/noise
Validating ATT&CK techniques using data components scales well
End-to-end functional testing
○ Provides a clear signal when there’s a problem
○ Captures nuances of techniques
Automation allows us to scale validation
Con: EDR telemetry provides a limited level of detail
Pro: EDR telemetry offloads detections from endpoints and
provides context around an alert
Questions?
Team blog series: The Validated Canary
Our validation philosophy
https://redcanary.com/blog/detection-validation/
Unearthing changes in our detection engine with Coalmine
https://redcanary.com/blog/coalmine/

More Related Content

What's hot

Evaluating and Enhancing Security Maturity through MITRE ATT&CK Mapping
Evaluating and Enhancing Security Maturity through MITRE ATT&CK MappingEvaluating and Enhancing Security Maturity through MITRE ATT&CK Mapping
Evaluating and Enhancing Security Maturity through MITRE ATT&CK Mapping
MITRE ATT&CK
 
Civil Society, Pegasus, and Predator: What Sophisticated Spyware Means For Us...
Civil Society, Pegasus, and Predator: What Sophisticated Spyware Means For Us...Civil Society, Pegasus, and Predator: What Sophisticated Spyware Means For Us...
Civil Society, Pegasus, and Predator: What Sophisticated Spyware Means For Us...
MITRE ATT&CK
 
Exploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOS
Exploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOSExploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOS
Exploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOS
MITRE ATT&CK
 
ATT&CK is the Best Defense - Emulating Sophisticated Adversary Malware to Bol...
ATT&CK is the Best Defense - Emulating Sophisticated Adversary Malware to Bol...ATT&CK is the Best Defense - Emulating Sophisticated Adversary Malware to Bol...
ATT&CK is the Best Defense - Emulating Sophisticated Adversary Malware to Bol...
MITRE ATT&CK
 
Cloud Native Workload ATT&CK Matrix
Cloud Native Workload ATT&CK MatrixCloud Native Workload ATT&CK Matrix
Cloud Native Workload ATT&CK Matrix
MITRE ATT&CK
 
ATT&CKing the Red/Blue Divide
ATT&CKing the Red/Blue DivideATT&CKing the Red/Blue Divide
ATT&CKing the Red/Blue Divide
MITRE ATT&CK
 
ATT&CKcon Intro
ATT&CKcon IntroATT&CKcon Intro
ATT&CKcon Intro
MITRE ATT&CK
 
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
MITRE ATT&CK
 
ATT&CK Updates- ATT&CK for ICS
ATT&CK Updates- ATT&CK for ICSATT&CK Updates- ATT&CK for ICS
ATT&CK Updates- ATT&CK for ICS
MITRE ATT&CK
 
FIRST CTI Symposium: Turning intelligence into action with MITRE ATT&CK™
FIRST CTI Symposium: Turning intelligence into action with MITRE ATT&CK™FIRST CTI Symposium: Turning intelligence into action with MITRE ATT&CK™
FIRST CTI Symposium: Turning intelligence into action with MITRE ATT&CK™
Katie Nickels
 
Intelligence Failures of Lincolns Top Spies: What CTI Analysts Can Learn Fro...
 Intelligence Failures of Lincolns Top Spies: What CTI Analysts Can Learn Fro... Intelligence Failures of Lincolns Top Spies: What CTI Analysts Can Learn Fro...
Intelligence Failures of Lincolns Top Spies: What CTI Analysts Can Learn Fro...
MITRE ATT&CK
 
MITRE ATT&CKcon 2.0: Lessons in Purple Team Testing with MITRE ATT&CK; Daniel...
MITRE ATT&CKcon 2.0: Lessons in Purple Team Testing with MITRE ATT&CK; Daniel...MITRE ATT&CKcon 2.0: Lessons in Purple Team Testing with MITRE ATT&CK; Daniel...
MITRE ATT&CKcon 2.0: Lessons in Purple Team Testing with MITRE ATT&CK; Daniel...
MITRE - ATT&CKcon
 
MITRE ATT&CK Updates: State of the ATT&CK (ATT&CKcon 4.0 Edition)
MITRE ATT&CK Updates: State of the ATT&CK (ATT&CKcon 4.0 Edition)MITRE ATT&CK Updates: State of the ATT&CK (ATT&CKcon 4.0 Edition)
MITRE ATT&CK Updates: State of the ATT&CK (ATT&CKcon 4.0 Edition)
MITRE ATT&CK
 
ATT&CK Updates- Defensive ATT&CK
ATT&CK Updates- Defensive ATT&CKATT&CK Updates- Defensive ATT&CK
ATT&CK Updates- Defensive ATT&CK
MITRE ATT&CK
 
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
MITRE - ATT&CKcon
 
Threat-Based Adversary Emulation with MITRE ATT&CK
Threat-Based Adversary Emulation with MITRE ATT&CKThreat-Based Adversary Emulation with MITRE ATT&CK
Threat-Based Adversary Emulation with MITRE ATT&CK
Katie Nickels
 
MITRE ATT&CK Updates: ICS
MITRE ATT&CK Updates: ICSMITRE ATT&CK Updates: ICS
MITRE ATT&CK Updates: ICS
MITRE ATT&CK
 
Threat Modelling - It's not just for developers
Threat Modelling - It's not just for developersThreat Modelling - It's not just for developers
Threat Modelling - It's not just for developers
MITRE ATT&CK
 
It's just a jump to the left (of boom): Prioritizing detection implementation...
It's just a jump to the left (of boom): Prioritizing detection implementation...It's just a jump to the left (of boom): Prioritizing detection implementation...
It's just a jump to the left (of boom): Prioritizing detection implementation...
MITRE ATT&CK
 
ATT&CK Updates- Campaigns
ATT&CK Updates- CampaignsATT&CK Updates- Campaigns
ATT&CK Updates- Campaigns
MITRE ATT&CK
 

What's hot (20)

Evaluating and Enhancing Security Maturity through MITRE ATT&CK Mapping
Evaluating and Enhancing Security Maturity through MITRE ATT&CK MappingEvaluating and Enhancing Security Maturity through MITRE ATT&CK Mapping
Evaluating and Enhancing Security Maturity through MITRE ATT&CK Mapping
 
Civil Society, Pegasus, and Predator: What Sophisticated Spyware Means For Us...
Civil Society, Pegasus, and Predator: What Sophisticated Spyware Means For Us...Civil Society, Pegasus, and Predator: What Sophisticated Spyware Means For Us...
Civil Society, Pegasus, and Predator: What Sophisticated Spyware Means For Us...
 
Exploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOS
Exploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOSExploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOS
Exploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOS
 
ATT&CK is the Best Defense - Emulating Sophisticated Adversary Malware to Bol...
ATT&CK is the Best Defense - Emulating Sophisticated Adversary Malware to Bol...ATT&CK is the Best Defense - Emulating Sophisticated Adversary Malware to Bol...
ATT&CK is the Best Defense - Emulating Sophisticated Adversary Malware to Bol...
 
Cloud Native Workload ATT&CK Matrix
Cloud Native Workload ATT&CK MatrixCloud Native Workload ATT&CK Matrix
Cloud Native Workload ATT&CK Matrix
 
ATT&CKing the Red/Blue Divide
ATT&CKing the Red/Blue DivideATT&CKing the Red/Blue Divide
ATT&CKing the Red/Blue Divide
 
ATT&CKcon Intro
ATT&CKcon IntroATT&CKcon Intro
ATT&CKcon Intro
 
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
 
ATT&CK Updates- ATT&CK for ICS
ATT&CK Updates- ATT&CK for ICSATT&CK Updates- ATT&CK for ICS
ATT&CK Updates- ATT&CK for ICS
 
FIRST CTI Symposium: Turning intelligence into action with MITRE ATT&CK™
FIRST CTI Symposium: Turning intelligence into action with MITRE ATT&CK™FIRST CTI Symposium: Turning intelligence into action with MITRE ATT&CK™
FIRST CTI Symposium: Turning intelligence into action with MITRE ATT&CK™
 
Intelligence Failures of Lincolns Top Spies: What CTI Analysts Can Learn Fro...
 Intelligence Failures of Lincolns Top Spies: What CTI Analysts Can Learn Fro... Intelligence Failures of Lincolns Top Spies: What CTI Analysts Can Learn Fro...
Intelligence Failures of Lincolns Top Spies: What CTI Analysts Can Learn Fro...
 
MITRE ATT&CKcon 2.0: Lessons in Purple Team Testing with MITRE ATT&CK; Daniel...
MITRE ATT&CKcon 2.0: Lessons in Purple Team Testing with MITRE ATT&CK; Daniel...MITRE ATT&CKcon 2.0: Lessons in Purple Team Testing with MITRE ATT&CK; Daniel...
MITRE ATT&CKcon 2.0: Lessons in Purple Team Testing with MITRE ATT&CK; Daniel...
 
MITRE ATT&CK Updates: State of the ATT&CK (ATT&CKcon 4.0 Edition)
MITRE ATT&CK Updates: State of the ATT&CK (ATT&CKcon 4.0 Edition)MITRE ATT&CK Updates: State of the ATT&CK (ATT&CKcon 4.0 Edition)
MITRE ATT&CK Updates: State of the ATT&CK (ATT&CKcon 4.0 Edition)
 
ATT&CK Updates- Defensive ATT&CK
ATT&CK Updates- Defensive ATT&CKATT&CK Updates- Defensive ATT&CK
ATT&CK Updates- Defensive ATT&CK
 
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
 
Threat-Based Adversary Emulation with MITRE ATT&CK
Threat-Based Adversary Emulation with MITRE ATT&CKThreat-Based Adversary Emulation with MITRE ATT&CK
Threat-Based Adversary Emulation with MITRE ATT&CK
 
MITRE ATT&CK Updates: ICS
MITRE ATT&CK Updates: ICSMITRE ATT&CK Updates: ICS
MITRE ATT&CK Updates: ICS
 
Threat Modelling - It's not just for developers
Threat Modelling - It's not just for developersThreat Modelling - It's not just for developers
Threat Modelling - It's not just for developers
 
It's just a jump to the left (of boom): Prioritizing detection implementation...
It's just a jump to the left (of boom): Prioritizing detection implementation...It's just a jump to the left (of boom): Prioritizing detection implementation...
It's just a jump to the left (of boom): Prioritizing detection implementation...
 
ATT&CK Updates- Campaigns
ATT&CK Updates- CampaignsATT&CK Updates- Campaigns
ATT&CK Updates- Campaigns
 

Similar to Tidying up your Nest: Validating ATT&CK Technique Coverage using EDR Telemetry

The Hunter Games: How to Find the Adversary with Event Query Language
The Hunter Games: How to Find the Adversary with Event Query LanguageThe Hunter Games: How to Find the Adversary with Event Query Language
The Hunter Games: How to Find the Adversary with Event Query Language
Ross Wolf
 
Dynamic Tracing of your AMP web site
Dynamic Tracing of your AMP web siteDynamic Tracing of your AMP web site
Dynamic Tracing of your AMP web site
Sriram Natarajan
 
MITRE ATT&CKcon 2018: From Technique to Detection, Paul Ewing and Ross Wolf, ...
MITRE ATT&CKcon 2018: From Technique to Detection, Paul Ewing and Ross Wolf, ...MITRE ATT&CKcon 2018: From Technique to Detection, Paul Ewing and Ross Wolf, ...
MITRE ATT&CKcon 2018: From Technique to Detection, Paul Ewing and Ross Wolf, ...
MITRE - ATT&CKcon
 
Puppet Camp DC 2015: Distributed OpenSCAP Compliance Validation with MCollective
Puppet Camp DC 2015: Distributed OpenSCAP Compliance Validation with MCollectivePuppet Camp DC 2015: Distributed OpenSCAP Compliance Validation with MCollective
Puppet Camp DC 2015: Distributed OpenSCAP Compliance Validation with MCollective
Puppet
 
Uvm presentation dac2011_final
Uvm presentation dac2011_finalUvm presentation dac2011_final
Uvm presentation dac2011_finalsean chen
 
101 run commands
101 run commands101 run commands
101 run commandsSunil Patel
 
Presentation iv implementasi 802x eap tls peap mscha pv2
Presentation iv implementasi  802x eap tls peap mscha pv2Presentation iv implementasi  802x eap tls peap mscha pv2
Presentation iv implementasi 802x eap tls peap mscha pv2Hell19
 
HKG18-TR14 - Postmortem Debugging with Coresight
HKG18-TR14 - Postmortem Debugging with CoresightHKG18-TR14 - Postmortem Debugging with Coresight
HKG18-TR14 - Postmortem Debugging with Coresight
Linaro
 
Building an Automated Behavioral Malware Analysis Environment using Free and ...
Building an Automated Behavioral Malware Analysis Environment using Free and ...Building an Automated Behavioral Malware Analysis Environment using Free and ...
Building an Automated Behavioral Malware Analysis Environment using Free and ...Jim Clausing
 
Reverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande ModemReverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande Modem
Cyber Security Alliance
 
Monitoring as Code: Getting to Monitoring-Driven Development - DEV314 - re:In...
Monitoring as Code: Getting to Monitoring-Driven Development - DEV314 - re:In...Monitoring as Code: Getting to Monitoring-Driven Development - DEV314 - re:In...
Monitoring as Code: Getting to Monitoring-Driven Development - DEV314 - re:In...
Amazon Web Services
 
Антон Наумович, Система автоматической крэш-аналитики своими средствами
Антон Наумович, Система автоматической крэш-аналитики своими средствамиАнтон Наумович, Система автоматической крэш-аналитики своими средствами
Антон Наумович, Система автоматической крэш-аналитики своими средствами
Sergey Platonov
 
CONFidence 2015: DTrace + OSX = Fun - Andrzej Dyjak
CONFidence 2015: DTrace + OSX = Fun - Andrzej Dyjak   CONFidence 2015: DTrace + OSX = Fun - Andrzej Dyjak
CONFidence 2015: DTrace + OSX = Fun - Andrzej Dyjak
PROIDEA
 
Security War Games
Security War GamesSecurity War Games
Security War Games
SeniorStoryteller
 
Sql Automation 20090610
Sql Automation 20090610Sql Automation 20090610
Sql Automation 20090610livingco
 
Why and How Powershell will rule the Command Line - Barcamp LA 4
Why and How Powershell will rule the Command Line - Barcamp LA 4Why and How Powershell will rule the Command Line - Barcamp LA 4
Why and How Powershell will rule the Command Line - Barcamp LA 4
Ilya Haykinson
 
100 comment win xp
100 comment win xp100 comment win xp
100 comment win xpNie Andini
 
RSA 2018: Adventures in the Underland: Techniques against Hackers Evading the...
RSA 2018: Adventures in the Underland: Techniques against Hackers Evading the...RSA 2018: Adventures in the Underland: Techniques against Hackers Evading the...
RSA 2018: Adventures in the Underland: Techniques against Hackers Evading the...
Paula Januszkiewicz
 
[2009 CodeEngn Conference 03] koheung - 윈도우 커널 악성코드에 대한 분석 및 방법
[2009 CodeEngn Conference 03] koheung - 윈도우 커널 악성코드에 대한 분석 및 방법[2009 CodeEngn Conference 03] koheung - 윈도우 커널 악성코드에 대한 분석 및 방법
[2009 CodeEngn Conference 03] koheung - 윈도우 커널 악성코드에 대한 분석 및 방법
GangSeok Lee
 
WMQ Toolbox: 20 Scripts, One-liners, & Utilities for UNIX & Windows
WMQ Toolbox: 20 Scripts, One-liners, & Utilities for UNIX & Windows WMQ Toolbox: 20 Scripts, One-liners, & Utilities for UNIX & Windows
WMQ Toolbox: 20 Scripts, One-liners, & Utilities for UNIX & Windows
T.Rob Wyatt
 

Similar to Tidying up your Nest: Validating ATT&CK Technique Coverage using EDR Telemetry (20)

The Hunter Games: How to Find the Adversary with Event Query Language
The Hunter Games: How to Find the Adversary with Event Query LanguageThe Hunter Games: How to Find the Adversary with Event Query Language
The Hunter Games: How to Find the Adversary with Event Query Language
 
Dynamic Tracing of your AMP web site
Dynamic Tracing of your AMP web siteDynamic Tracing of your AMP web site
Dynamic Tracing of your AMP web site
 
MITRE ATT&CKcon 2018: From Technique to Detection, Paul Ewing and Ross Wolf, ...
MITRE ATT&CKcon 2018: From Technique to Detection, Paul Ewing and Ross Wolf, ...MITRE ATT&CKcon 2018: From Technique to Detection, Paul Ewing and Ross Wolf, ...
MITRE ATT&CKcon 2018: From Technique to Detection, Paul Ewing and Ross Wolf, ...
 
Puppet Camp DC 2015: Distributed OpenSCAP Compliance Validation with MCollective
Puppet Camp DC 2015: Distributed OpenSCAP Compliance Validation with MCollectivePuppet Camp DC 2015: Distributed OpenSCAP Compliance Validation with MCollective
Puppet Camp DC 2015: Distributed OpenSCAP Compliance Validation with MCollective
 
Uvm presentation dac2011_final
Uvm presentation dac2011_finalUvm presentation dac2011_final
Uvm presentation dac2011_final
 
101 run commands
101 run commands101 run commands
101 run commands
 
Presentation iv implementasi 802x eap tls peap mscha pv2
Presentation iv implementasi  802x eap tls peap mscha pv2Presentation iv implementasi  802x eap tls peap mscha pv2
Presentation iv implementasi 802x eap tls peap mscha pv2
 
HKG18-TR14 - Postmortem Debugging with Coresight
HKG18-TR14 - Postmortem Debugging with CoresightHKG18-TR14 - Postmortem Debugging with Coresight
HKG18-TR14 - Postmortem Debugging with Coresight
 
Building an Automated Behavioral Malware Analysis Environment using Free and ...
Building an Automated Behavioral Malware Analysis Environment using Free and ...Building an Automated Behavioral Malware Analysis Environment using Free and ...
Building an Automated Behavioral Malware Analysis Environment using Free and ...
 
Reverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande ModemReverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande Modem
 
Monitoring as Code: Getting to Monitoring-Driven Development - DEV314 - re:In...
Monitoring as Code: Getting to Monitoring-Driven Development - DEV314 - re:In...Monitoring as Code: Getting to Monitoring-Driven Development - DEV314 - re:In...
Monitoring as Code: Getting to Monitoring-Driven Development - DEV314 - re:In...
 
Антон Наумович, Система автоматической крэш-аналитики своими средствами
Антон Наумович, Система автоматической крэш-аналитики своими средствамиАнтон Наумович, Система автоматической крэш-аналитики своими средствами
Антон Наумович, Система автоматической крэш-аналитики своими средствами
 
CONFidence 2015: DTrace + OSX = Fun - Andrzej Dyjak
CONFidence 2015: DTrace + OSX = Fun - Andrzej Dyjak   CONFidence 2015: DTrace + OSX = Fun - Andrzej Dyjak
CONFidence 2015: DTrace + OSX = Fun - Andrzej Dyjak
 
Security War Games
Security War GamesSecurity War Games
Security War Games
 
Sql Automation 20090610
Sql Automation 20090610Sql Automation 20090610
Sql Automation 20090610
 
Why and How Powershell will rule the Command Line - Barcamp LA 4
Why and How Powershell will rule the Command Line - Barcamp LA 4Why and How Powershell will rule the Command Line - Barcamp LA 4
Why and How Powershell will rule the Command Line - Barcamp LA 4
 
100 comment win xp
100 comment win xp100 comment win xp
100 comment win xp
 
RSA 2018: Adventures in the Underland: Techniques against Hackers Evading the...
RSA 2018: Adventures in the Underland: Techniques against Hackers Evading the...RSA 2018: Adventures in the Underland: Techniques against Hackers Evading the...
RSA 2018: Adventures in the Underland: Techniques against Hackers Evading the...
 
[2009 CodeEngn Conference 03] koheung - 윈도우 커널 악성코드에 대한 분석 및 방법
[2009 CodeEngn Conference 03] koheung - 윈도우 커널 악성코드에 대한 분석 및 방법[2009 CodeEngn Conference 03] koheung - 윈도우 커널 악성코드에 대한 분석 및 방법
[2009 CodeEngn Conference 03] koheung - 윈도우 커널 악성코드에 대한 분석 및 방법
 
WMQ Toolbox: 20 Scripts, One-liners, & Utilities for UNIX & Windows
WMQ Toolbox: 20 Scripts, One-liners, & Utilities for UNIX & Windows WMQ Toolbox: 20 Scripts, One-liners, & Utilities for UNIX & Windows
WMQ Toolbox: 20 Scripts, One-liners, & Utilities for UNIX & Windows
 

More from MITRE ATT&CK

Dealing With ATT&CK's Different Levels Of Detail
Dealing With ATT&CK's Different Levels Of DetailDealing With ATT&CK's Different Levels Of Detail
Dealing With ATT&CK's Different Levels Of Detail
MITRE ATT&CK
 
Automating testing by implementing ATT&CK using the Blackboard Architecture
Automating testing by implementing ATT&CK using the Blackboard ArchitectureAutomating testing by implementing ATT&CK using the Blackboard Architecture
Automating testing by implementing ATT&CK using the Blackboard Architecture
MITRE ATT&CK
 
I can haz cake: Benefits of working with MITRE on ATT&CK
I can haz cake: Benefits of working with MITRE on ATT&CKI can haz cake: Benefits of working with MITRE on ATT&CK
I can haz cake: Benefits of working with MITRE on ATT&CK
MITRE ATT&CK
 
ATT&CK’s Adoption in CTI: A Great Success (with Room to Grow!)
ATT&CK’s Adoption in CTI: A Great Success (with Room to Grow!)ATT&CK’s Adoption in CTI: A Great Success (with Room to Grow!)
ATT&CK’s Adoption in CTI: A Great Success (with Room to Grow!)
MITRE ATT&CK
 
MITRE ATT&CK Updates: State of the Cloud
MITRE ATT&CK Updates: State of the CloudMITRE ATT&CK Updates: State of the Cloud
MITRE ATT&CK Updates: State of the Cloud
MITRE ATT&CK
 
Using ATT&CK to created wicked actors in real data
Using ATT&CK to created wicked actors in real dataUsing ATT&CK to created wicked actors in real data
Using ATT&CK to created wicked actors in real data
MITRE ATT&CK
 
MITRE ATT&CK Updates: New Ideas in Enterprise - Pushing the boundaries of ATT...
MITRE ATT&CK Updates: New Ideas in Enterprise - Pushing the boundaries of ATT...MITRE ATT&CK Updates: New Ideas in Enterprise - Pushing the boundaries of ATT...
MITRE ATT&CK Updates: New Ideas in Enterprise - Pushing the boundaries of ATT...
MITRE ATT&CK
 
Navigating the Attention Economy – Using MITRE ATT&CK to Communicate to Stake...
Navigating the Attention Economy – Using MITRE ATT&CK to Communicate to Stake...Navigating the Attention Economy – Using MITRE ATT&CK to Communicate to Stake...
Navigating the Attention Economy – Using MITRE ATT&CK to Communicate to Stake...
MITRE ATT&CK
 
The case for quishing
The case for quishingThe case for quishing
The case for quishing
MITRE ATT&CK
 
Discussion on Finding Relationships in Cyber Data
Discussion on Finding Relationships in Cyber DataDiscussion on Finding Relationships in Cyber Data
Discussion on Finding Relationships in Cyber Data
MITRE ATT&CK
 
The art of communicating ATT&CK to the CFO
The art of communicating ATT&CK to the CFOThe art of communicating ATT&CK to the CFO
The art of communicating ATT&CK to the CFO
MITRE ATT&CK
 
MITRE ATT&CK Updates: Software
MITRE ATT&CK Updates: SoftwareMITRE ATT&CK Updates: Software
MITRE ATT&CK Updates: Software
MITRE ATT&CK
 
Or Lenses and Layers: Adding Business Context to Enterprise Mappings
Or Lenses and Layers: Adding Business Context to Enterprise MappingsOr Lenses and Layers: Adding Business Context to Enterprise Mappings
Or Lenses and Layers: Adding Business Context to Enterprise Mappings
MITRE ATT&CK
 
Adjectives for ATT&CK
Adjectives for ATT&CKAdjectives for ATT&CK
Adjectives for ATT&CK
MITRE ATT&CK
 

More from MITRE ATT&CK (14)

Dealing With ATT&CK's Different Levels Of Detail
Dealing With ATT&CK's Different Levels Of DetailDealing With ATT&CK's Different Levels Of Detail
Dealing With ATT&CK's Different Levels Of Detail
 
Automating testing by implementing ATT&CK using the Blackboard Architecture
Automating testing by implementing ATT&CK using the Blackboard ArchitectureAutomating testing by implementing ATT&CK using the Blackboard Architecture
Automating testing by implementing ATT&CK using the Blackboard Architecture
 
I can haz cake: Benefits of working with MITRE on ATT&CK
I can haz cake: Benefits of working with MITRE on ATT&CKI can haz cake: Benefits of working with MITRE on ATT&CK
I can haz cake: Benefits of working with MITRE on ATT&CK
 
ATT&CK’s Adoption in CTI: A Great Success (with Room to Grow!)
ATT&CK’s Adoption in CTI: A Great Success (with Room to Grow!)ATT&CK’s Adoption in CTI: A Great Success (with Room to Grow!)
ATT&CK’s Adoption in CTI: A Great Success (with Room to Grow!)
 
MITRE ATT&CK Updates: State of the Cloud
MITRE ATT&CK Updates: State of the CloudMITRE ATT&CK Updates: State of the Cloud
MITRE ATT&CK Updates: State of the Cloud
 
Using ATT&CK to created wicked actors in real data
Using ATT&CK to created wicked actors in real dataUsing ATT&CK to created wicked actors in real data
Using ATT&CK to created wicked actors in real data
 
MITRE ATT&CK Updates: New Ideas in Enterprise - Pushing the boundaries of ATT...
MITRE ATT&CK Updates: New Ideas in Enterprise - Pushing the boundaries of ATT...MITRE ATT&CK Updates: New Ideas in Enterprise - Pushing the boundaries of ATT...
MITRE ATT&CK Updates: New Ideas in Enterprise - Pushing the boundaries of ATT...
 
Navigating the Attention Economy – Using MITRE ATT&CK to Communicate to Stake...
Navigating the Attention Economy – Using MITRE ATT&CK to Communicate to Stake...Navigating the Attention Economy – Using MITRE ATT&CK to Communicate to Stake...
Navigating the Attention Economy – Using MITRE ATT&CK to Communicate to Stake...
 
The case for quishing
The case for quishingThe case for quishing
The case for quishing
 
Discussion on Finding Relationships in Cyber Data
Discussion on Finding Relationships in Cyber DataDiscussion on Finding Relationships in Cyber Data
Discussion on Finding Relationships in Cyber Data
 
The art of communicating ATT&CK to the CFO
The art of communicating ATT&CK to the CFOThe art of communicating ATT&CK to the CFO
The art of communicating ATT&CK to the CFO
 
MITRE ATT&CK Updates: Software
MITRE ATT&CK Updates: SoftwareMITRE ATT&CK Updates: Software
MITRE ATT&CK Updates: Software
 
Or Lenses and Layers: Adding Business Context to Enterprise Mappings
Or Lenses and Layers: Adding Business Context to Enterprise MappingsOr Lenses and Layers: Adding Business Context to Enterprise Mappings
Or Lenses and Layers: Adding Business Context to Enterprise Mappings
 
Adjectives for ATT&CK
Adjectives for ATT&CKAdjectives for ATT&CK
Adjectives for ATT&CK
 

Recently uploaded

To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 

Recently uploaded (20)

To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 

Tidying up your Nest: Validating ATT&CK Technique Coverage using EDR Telemetry

  • 1. Tidying up your Nest Validating ATT&CK Technique Coverage Using EDR Telemetry
  • 2. Presenters Jesse Brown Senior Detection Validation Engineer @jessecbrown Adam Ostrich Senior Detection Validation Engineer Detection Validation Team Understand how things should work Make sure things work like they should Make things work better
  • 3. Outline What is EDR telemetry? How Red Canary works Validation of ATT&CK techniques Automated validation workflow Lessons learned
  • 4. Outline What is EDR telemetry? How Red Canary works Validation of ATT&CK techniques Automated validation workflow Lessons learned
  • 5. What is EDR Telemetry? Cost of collection (Time, CPU/memory/bandwidth) Depth of coverage EDR Telemetry Forensic Images Good for hunting System Logs
  • 6. Telemetry Types PS > Invoke-Expression -Command "procdump -ma lsass.exe lsass.dmp" Remote PS
  • 7. Telemetry Types PS > Invoke-Expression -Command "procdump -ma lsass.exe lsass.dmp" Network connection Remote PS wsmprovhost.exe process
  • 8. Telemetry Types File system procdump.exe PS > Invoke-Expression -Command "procdump -ma lsass.exe lsass.dmp" powershell.exe process Script load Process start procdump.exe process Network connection Remote PS wsmprovhost.exe process
  • 9. Telemetry Types File system procdump.exe kernel32.dll PS > Invoke-Expression -Command "procdump -ma lsass.exe lsass.dmp" powershell.exe process Script load Process start Module load procdump.exe process Network connection Remote PS wsmprovhost.exe process
  • 10. Telemetry Types File system procdump.exe kernel32.dll PS > Invoke-Expression -Command "procdump -ma lsass.exe lsass.dmp" powershell.exe process Script load Process start Module load Windows Registry EULA registry key procdump.exe process Registry modification Network connection Remote PS wsmprovhost.exe process
  • 11. Telemetry Types File system lsass.exe process procdump.exe kernel32.dll PS > Invoke-Expression -Command "procdump -ma lsass.exe lsass.dmp" powershell.exe process Script load Process start Module load Crossproc Windows Registry EULA registry key procdump.exe process Registry modification Network connection Remote PS wsmprovhost.exe process
  • 12. Telemetry Types File system lsass.exe process procdump.exe kernel32.dll PS > Invoke-Expression -Command "procdump -ma lsass.exe lsass.dmp" lsass.dmp powershell.exe process Script load Process start Module load Crossproc File create Windows Registry EULA registry key procdump.exe process Registry modification Network connection Remote PS wsmprovhost.exe process
  • 13. Telemetry Types File system lsass.exe process procdump.exe kernel32.dll PS > Invoke-Expression -Command "procdump -ma lsass.exe lsass.dmp" lsass.dmp powershell.exe process Script load Process start Module load Crossproc File create Windows Registry EULA registry key procdump.exe process APIs Registry modification Network connection Remote PS wsmprovhost.exe process
  • 14. Telemetry Types File system lsass.exe process procdump.exe kernel32.dll PS > Invoke-Expression -Command "procdump -ma lsass.exe lsass.dmp" lsass.dmp powershell.exe process Script load Process start Module load Crossproc File create Windows Registry EULA registry key procdump.exe process APIs File open Registry modification Network connection Remote PS wsmprovhost.exe process
  • 15. It’s JSON! { "event_type": "process_start", "process_command_line": "procdump -ma lsass.exe lsass.dmp", "process_md5": "f2091c44d89789f689d98bc244358878", "process_name": "procdump.exe", "process_path": "C:Sysinternalsprocdump.exe", "process_pid": 1528, }
  • 16. Outline What is EDR telemetry? How Red Canary works Validation of ATT&CK techniques Automated validation workflow Lessons learned
  • 17. How Red Canary works (and maybe you too?)
  • 18. { "Event.type": "ProcessStart", "Process.cmdline": "procdump -ma lsass.exe lsass.dmp", "Process.md5": "f2091c44d89789f689d98bc244358878", "Process.name": "procdump.exe", "Process.path": "C:Sysinternalsprocdump.exe", "Process.pid": 1528, } { "event_type": "process_start", "process_command_line": "procdump -ma lsass.exe lsass.dmp", "process_md5": "f2091c44d89789f689d98bc244358878", "process_name": "procdump.exe", "process_path": "C:Sysinternalsprocdump.exe", "process_pid": 1528, } Standardization Native Standardized
  • 19. Outline What is EDR telemetry? How Red Canary works Validation of ATT&CK techniques Automated validation workflow Lessons learned
  • 20. Validate coverage across ATT&CK techniques Break techniques down to data components Data component Detects Process creation procdump -ma lsass.exe lsass.dmp Command execution Invoke-Mimikatz Process access API calls to OpenProcess/MiniDumpWriteDump Process access Crossproc (e.g. open process handle) File modification File lsass.dmp written to disk OS Credential Dumping: LSASS Memory (T1003.001)
  • 21. ATT&CK Technique Coverage by Data Component Enterprise Techniques
  • 23. End-to-end functional testing! Run functional test Report expected results Compare expected results to actual results Analyze/detect changes in results
  • 24. Outline What is EDR telemetry? How Red Canary works Validation of ATT&CK techniques Automated validation workflow Lessons learned
  • 25. Scaling Validation with Automation 1) Spin up infrastructure 2) Run tests 3) Analyze results
  • 26. Architecture 1) Spin up infrastructure
  • 27. Coalmine Spin up infrastructure ○ Terraform and ansible ○ Creates/configures EC2 instances Run tests ○ Atomic Red Team https://github.com/redcanaryco/ansible-atomic-red-team ○ Atomic Test Harnesses https://atomicredteam.io/atomic-test-harnesses ○ Vuvuzela
  • 29. Vuvuzela (OS) data "event_type": "process_start" "process_command_line": "procdump -ma lsass.exe lsass.dmp" "process_md5": "f2091c44d89789f689d98bc244358878" "process_name": "procdump.exe" "process_path": "C:Sysinternalsprocdump.exe" "process_pid": 1528 Test VM EDR sensor data "event_type": "process_start" "process_command_line": "procdump -ma lsass.exe lsass.dmp" "process_md5": "f2091c44d89789f689d98bc244358878" "process_name": "procdump.exe" "process_path": "DeviceHarddiskVolume1Sysinternalsprocdump.exe" "process_pid": 1529 Vuvuzela: Black box testing procdump test Vuvuzela EDR sensor Test execution Observation Observation Reported data Reported data Mismatch
  • 30. Expected Results Report Test sensor/endpoint to identify sensor data Expected detection analytics Expected standardized telemetry
  • 32. Telemetry Validation Lambda Function Identify relevant engine data Telemetry Profiling Compare expected results to engine data Report results to S3 Splunk API
  • 33. Telemetry Validation Lambda Function Identify relevant engine data Telemetry Profiling Compare expected results to engine data Report results to S3 Splunk API
  • 34. Telemetry Validation Lambda Function Identify relevant engine data Telemetry Profiling Compare expected results to engine data Report results to S3 Splunk API
  • 35. Telemetry Validation Lambda Function Identify relevant engine data Telemetry Profiling Compare expected results to engine data Report results to S3 Splunk API
  • 36. Valid Skipped Invalid Splunk dashboard example Field name Expected Found process_command_lin e procdump -ma lsass.exe lsass.dmp procdump -ma lsass.exe lsass.dmp process_md5 f2091c44d89789f689d98bc244358878 f2091c44d89789f689d98bc244358878 process_name procdump.exe procdump.exe Field name Expected Found process_sha1 db1ef4ce56820c93a3b7f1fdf36d3fffc7d1ec96 process_sha256 e4ea34a7c2b51982a6c42c6367119f34bec9aeb9a60937836540035583a5b3bc Field name Expected Found process_path C:Sysinternalsprocdump.exe DeviceHarddiskVolume1Sysinternalsprocdump.exe process_pid 1528 1529
  • 38. Outline What is EDR telemetry? How Red Canary works Validation of ATT&CK techniques Automated validation workflow Lessons learned
  • 39. Telemetry quirks Signal/noise ratio different for each sensor ○ Lower quality telemetry (i.e. filemods & regmods) can be highly filtered ○ Filemod filtering by process, directory, and file type File telemetry has inconsistent meaning/terminology ○ What is a filemod? ○ Creation vs. modification
  • 40. Challenges of using EDR telemetry Level of detail is limited ○ Limited insight into certain types of behaviors like API calls ○ Can’t use static binary signatures outside of a hash ○ Certain telemetry types are limited because they’re noisy Example: Credential theft ○ Dumping lsass -> good telemetry ○ Application credential theft (e.g. browsers) -> limited/no telemetry ○ EDR sensors are good at generating alerts for this activity
  • 41. Benefits of using EDR telemetry Offloading detections from endpoints ○ Avoids limitations of analytics on endpoints ○ Highly scalable ○ Adversary can’t see alerts Versatile representation of behavior ○ Captures context ○ Useful for correlation
  • 42. Key takeaways EDR telemetry balances signal/noise Validating ATT&CK techniques using data components scales well End-to-end functional testing ○ Provides a clear signal when there’s a problem ○ Captures nuances of techniques Automation allows us to scale validation Con: EDR telemetry provides a limited level of detail Pro: EDR telemetry offloads detections from endpoints and provides context around an alert
  • 43. Questions? Team blog series: The Validated Canary Our validation philosophy https://redcanary.com/blog/detection-validation/ Unearthing changes in our detection engine with Coalmine https://redcanary.com/blog/coalmine/