Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Automated Adversary Emulation Using Caldera

BruCON Security Conference via YouTube

Overview

Explore automated adversary emulation using MITRE's Caldera 2.0 in this comprehensive conference talk from BruCON Security Conference. Dive into the world of MITRE ATT&CK and learn how tools like Caldera facilitate corporate adoption of this important cybersecurity standard. Discover how to leverage Caldera's new extendibility features to maximize its effectiveness in assessing an organization's security posture. Gain insights on improving Caldera's reporting engine, building additional plugins to increase ATT&CK coverage, and adapting the tool to work around common security controls like Windows 10's ExploitGuard and AMSI. Learn practical skills for extending adversary emulation capabilities without investing in expensive commercial tools. Witness technical demonstrations and explore the nitty-gritty details of development efforts, including publicly released plugins. Equip yourself with the knowledge to enhance your organization's cybersecurity defenses through advanced adversary emulation techniques.

Syllabus

08 - BruCON 0x0B - Automated adversary emulation using Caldera - Erik Van Buggenhout

Taught by

BruCON Security Conference

Reviews

Start your review of Automated Adversary Emulation Using Caldera

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.