Adversary Emulation with Caldera | Red Team Series 1-12
This guide is part of the HackerSploit Red Team series of guides. CALDERA™ is a cybersecurity framework designed to easily automate adversary emulation, assist manual red-teams, and automate incident response. It is built on the MITRE ATT&CK™ framework and is an active research project at MITRE.
Chapters:
0:28 What We’ll Be Covering
0:00 Introduction
1:46 Prerequisites
3:17 Let’s Get Started
4:11 What is Red Teaming
8:12 Red Teaming vs Pentesting
12:13 What is Adversary Emulation
14:19 Red Team Kill Chain
16:09 What is MITRE Attack
19:14 What is Caldera?
20:45 Caldera Terminology
23:26 Practical Aspect
23:39 What is the Mitre Attack Framework?
28:49 Configuring Caldera
37:00 Accessing the Caldera Server
38:33 Adding Hosts as Agents
40:35 Deploying an Agent
49:20 Evaluating Adversaries
52:27 Creating an Adversary Profile
55:13 Caldera Operations
1:03:28 Examining Privilege Escalation Tactics
1:10:31 Creating an Adversary Profile
1:13:51 Checking on our Agents
1:16:11 Using other Adversarial Methods
1:18:37 Creating Another Adversary Profile
1:21:10 Running Our Adversary Profile
1:22:30 Enumerating Manually
1:28:01 Reporting Overview
1:31:13 Plugin Overview
1:35:49 Quick Recap
New to Linode? Get started here with a $100 credit!
Read the doc for more information on Caldera.
Learn more about Hackersploit.
Subscribe to get notified of new episodes as they come out.
#Linode #Security #RedTeam #Hackersploit
Product: Linode, Security, Red Team; Hackersploit;