Cyber Security Battleground - Red Team/Blue Team Operations Challenge
Do you have what it takes? Can you withstand a cyber-attack from a team that learned from a master? If you had learnt from the same master? Welcome to the four-day Red Team/Blue Team Operations, ending with you measuring up at the battlefield!
Kursen hålls på begäran
Kontakta oss för mer information.
Telefon: 08-562 557 50
Two Teams, two different approaches, Red Team vs Blue Team Cyberwar Challenge! The cyber kill chain - reconnaissance, attack planning and delivery, system exploitation, privilege escalation and lateral movement, anomalies detection, discovery of industry attacks and threats, understanding how compromised system or solution looks like, defining the indicators of the attack, and incident handling.
- Is your security program effective?
- Are you able to stop simulated attacks?
- Are you ready for this cyberwar challenge and who will win?
The ultimate aim is to test organization’s security as well as ability to detect and respond to an attack. Challenge yourself and join the Red Team vs Blue Team Cyberwar Challenge!
Target Audience and Prerequitites
This training is intended for enterprise administrators, infrastructure architects, security professionals, systems engineers, IT professionals, security consultants and other people responsible for implementing network and perimeter security in an environment mainly based on Microsoft solutions.
To participate, you should have a good hands-on experience in administering Windows infrastructure. At least 8 years in the field is recommended.
This training is designed and delivered by the world renowned security expert and penetration tester Paula Januszkiewicz and her team of experts at the IT security company Cqure.
Part 1 - Red Team Training - 1½ day
Part 1 - Blue Team Training - 1½ day
Identifying Areas of Vulnerability
This part introduces the new cybersecurity challenges and trends, emphasizing on data security and integration through and into the cloud and the challenges of the coordination of the cloud and on-premise security solutions. Security is a business enabler, and it is only when it is viewed from a business perspective that we can truly make the right decisions. You will learn how to define values of your company which needs to be protected or restricted. You will know how to find obvious and not so obvious sensitive information which can be monetized by adversaries. Having that scope defined and knowing your resources you will know where the biggest gaps in your security posture are.
Protecting entry points
We can’t detect every kind of recon ops but it doesn’t mean we can’t detect some of them. It is crucial to understand what kind of information is publicly available and to learn how to protect that information by proactively analyzing network traffic. Attacker can use many different methods to deliver malicious payload. Blue team needs to ensure that even if delivered, payloads are detected and blocked at early stage.
Executed payload doesn’t have to mean that system is compromised. There are many mechanisms that, if properly configured, significantly reduce attack scope.
Least privilege principle
The chances of privilege escalation will be significantly reduced if the principle of least privilege will be properly used. The principle means giving a user account, service or process only those privileges which are essential to perform its intended function.
Inspecting own backyard
Internal network shouldn’t be treated as trusted. Plenty of things can go undetected if proper mechanisms aren’t deployed. Before red teamer can reach Domain Controller or other critical servers, blue team can implement numerous protections against that threat to detect and neutralize infected hosts.
Once attack is detected and neutralized, it is important to locate all other infected hosts. Attacker can leave multiple backdoors or intentionally introduce security problems. It is crucial to test entire environment for that threat.
Part 2 - The Battle - 1 day
Students will be divided in two groups – both will have a mix of Red Team and Blue Team people. Both groups would get their own small set of machines to configure and protect. The machines would server various purposes – some of them will have services configured, such as WWW, DNS or SMB.
The first two hours would be used to understand the architecture, found out what services are running, what is the configuration, and so on. Cooperating as a group, their job would be to harden the configuration, find and fix misconfigurations and plan future services – such as logging the events!
After two hours, the big firewall between two groups is disabled, and groups can see each other’s networks. The fun starts here. Red Team members will try to find vulnerabilities in target systems and recover some sort of secret (the flag). At the same time Blue Team members will try hard to prevent that - by deploying set of protections, monitoring the network and actively stopping the attacks.
To make things even more exciting, automated clients will also interact with the services. Each group has to make sure, that work of the services is not interrupted, and regular clients can still use them.
Each flag will be unique. After obtained, it should be sent to our scoring systems, where groups can see the description of all challenges, as well as, current scoreboard! Each flag is scored differently, the harder it is to get it, the more points at the end! Points can also be used to buy additional hints if group can’t move forward with one of other challenges.
The last hour would be used to summarize what worked and what not – groups would describe what they did to retrieve the flag or what they did to prevent the other team from recover that. Instructor would also answer all the questions and show what was the intended solution to beat some of the challenges.