Главная
Study mode:
on
1
Intro
2
FUN FACT ON PERU
3
BLUE TEAM IN 2019
4
BUILDING THE ATTACKER'S PLAYGROUND
5
DETECTION ENGINEERING
6
FIRST STEP: PREVENTION CONTROLS
7
VALIDATE DETECTION RESILIENCE
8
MEASURE DETECTION MATURITY
9
AUTOMATED ADVERSARY SIMULATION
10
PENTEST REPORT 2018
11
PASSWORD SPRAYING: T1110
12
NETWORK SPRAY: PICKING HOST TARGETS
13
DETECTION ANALYTICS
14
NETWORK SHARE (T1135) & PRIVILEGE ENUMERATION
15
CLOSINS SURVEY FOR THE BLUE TEAM
Description:
Explore adversary simulation techniques to enhance detection engineering in this 50-minute conference talk from Derbycon 2019. Dive into building an attacker's playground, implementing prevention controls, and validating detection resilience. Learn about automated adversary simulation, password spraying, network share enumeration, and privilege escalation. Gain insights on measuring detection maturity and analyzing detection analytics to improve your blue team's capabilities.

I Simulate Therefore I Catch - Enhancing Detection Engineering with Adversary Simulation

Add to list
00:00
-02:34