Explore adversarial emulation techniques in this 47-minute conference talk from Derbycon 2019. Delve into key concepts presented by Bryson Bort, covering communication protocols, the evolution of red teams, defense validation, and the distinctions between emulation and simulation. Learn about open-source options, PowerShell applications, ransomware tactics, networking activities, and lateral movement strategies. Gain insights into the people behind today's red teams and understand the goals of effective adversarial emulation in cybersecurity.
Overview
Syllabus
Introduction
Concept
Bryson
Communication Protocols
The People
Todays Red Team
What Do We Want
Defense Validation
Emulation vs Emulation
Good and Bad
Open Source Options
PowerShell
Ransomware
Networking activities
Lateral movement