Тёмный

Using MITRE Caldera to Emulate Threats in Your Environment 

Raiders of the Lost ARP
Подписаться 209
Просмотров 9 тыс.
50% 1

Red Team assessments and penetration tests are essential efforts to helping improve your defenses, but what if you wish to try this yourself? Caldera offers you a rich, automated, and open-source platform by which to test defenses and truly test how you are doing. It is also extremely helpful in learning how threat actors might approach your environment, and is a great instructional tool!
DISCLAIMER: Please do not use this in a live production environment without explicit consent and legal review. This tool - when used inappropriately - have the potential to affect performance or impact services. Use of this toolset against a non-production environment is highly recommended while building proficiency and doing most testing.
Caldera Home Page: caldera.mitre.org
Caldera Documentation: caldera.readth...
Caldera's GitHub: github.com/mit...
MITRE ATT&CK's Home Page: attack.mitre.org
MITRE's Center for Threat-Informed Defense: ctid.mitre-eng...

Опубликовано:

 

11 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 10   
@kcinytrewq
@kcinytrewq 11 месяцев назад
Very concise well made video. Thank you.
@asdfasddfs5484
@asdfasddfs5484 Год назад
Thank you
@JamnD300
@JamnD300 Год назад
Awesome video, extremely helpful. I cant seem to import adversaries. What is the process to do so?
@MikeMcPhee101
@MikeMcPhee101 Год назад
Hello Ben! the EMU plugin is the key to getting adversaries imported. you would need to activate this in the Configuration for plugins and then reboot the Caldera instance. Depending on how you deployed it, you may find it is a little flakey - I have my best luck with it running on an Linux (Ubuntu) VM, rather than as a container on local host.
@tunisianpentester5441
@tunisianpentester5441 2 года назад
thanks for the great video, very informative
@MikeMcPhee101
@MikeMcPhee101 Год назад
Thank you! Very glad you liked it and found something useful in it!
@heinrichmartinez445
@heinrichmartinez445 Год назад
wow!
@redbeardjunior
@redbeardjunior Год назад
I like your video but for me the text on the website is hard to read !
@MikeMcPhee101
@MikeMcPhee101 Год назад
I am sorry for that - I will work on ensuring that readability is built into future videos!
@redbeardjunior
@redbeardjunior Год назад
@@MikeMcPhee101 Thank you !
Далее
Using MITRE's ATT&CK Navigator for Gap Analysis
24:57
World‘s Strongest Man VS Apple
01:00
Просмотров 31 млн
Katta janjal
00:29
Просмотров 325 тыс.
ATT&CK Matrix: The Enemies Playbook
14:04
Просмотров 50 тыс.
Automating Adversary Emulation with MITRE Caldera
19:44
MITRE Practical Use Cases
18:43
Просмотров 19 тыс.
Hacking with Bloodhound: Map Your Environment
39:25
Просмотров 68 тыс.
When you Accidentally Compromise every CPU on Earth
15:59
World‘s Strongest Man VS Apple
01:00
Просмотров 31 млн