subscription.packtpub.com
Open in
urlscan Pro
2606:4700:10::6816:af
Public Scan
URL:
https://subscription.packtpub.com/book/security/9781838828868/4/ch04lvl1sec37/defining-metrics-and-kpis
Submission: On July 14 via manual from MY — Scanned from DE
Submission: On July 14 via manual from MY — Scanned from DE
Form analysis
1 forms found in the DOMhttps://subscription.packtpub.com/search
<form action="https://subscription.packtpub.com/search" class="form-inline"><input required="" name="query" placeholder="Search titles …" type="text" class="mr-sm-2 form-control"><button type="submit"
class="btn"><i class="fa fa-search" aria-hidden="true"></i></button></form>
Text Content
Browse Library Advanced Search Browse LibraryAdvanced SearchSign InStart Free Trial Cybersecurity Attacks – Red Team Strategies More info and buy Hide related titles Related titles David Routin | Simon Thoores | Samuel Ro... Purple Team Strategies Dan Borges (2021) Adversarial Tradecraft in Cybersecurity Hinne Hettema (2022) Agile Security Operations Preface * Preface * A note about terminology * Who this book is for * What this book covers? * To get the most out of this book * Download the example code files * Download the color images * Conventions used * Get in touch * Reviews * Disclaimer 1 Section 1: Embracing the Red * Section 1: Embracing the Red 2 Chapter 1: Establishing an Offensive Security Program * Chapter 1: Establishing an Offensive Security Program * Defining the mission – the devil's advocate * Getting leadership support * Locating a red team in the organization chart * The road ahead for offensive security * Providing different services to the organization * Additional responsibilities of the offensive program * Training and education of the offensive security team * Policies – principles, rules, and standards * Rules of engagement * Standard operating procedure * Modeling the adversary * Anatomy of a breach * Modes of execution – surgical or carpet bombing * Environment and office space * Summary * Questions 3 Chapter 2: Managing an Offensive Security Team * Chapter 2: Managing an Offensive Security Team * Understanding the rhythm of the business and planning Red Team operations * Managing and assessing the team * Management by walking around * Managing your leadership team * Managing yourself * Handling logistics, meetings, and staying on track * Growing as a team * Leading and inspiring the team * For the best results – let them loose! * Leveraging homefield advantage * Disrupting the purple team * Summary * Questions 4 Chapter 3: Measuring an Offensive Security Program * Chapter 3: Measuring an Offensive Security Program * Understanding the illusion of control * The road to maturity * Threats – trees and graphs * Defining metrics and KPIs * Test Maturity Model integration (TMMi ®)and red teaming * MITRE ATT&CK™ Matrix * Remembering what red teaming is about * Summary * Questions 5 Chapter 4: Progressive Red Teaming Operations * Chapter 4: Progressive Red Teaming Operations * Exploring varieties of cyber operational engagements * Cryptocurrency mining * Red teaming for privacy * Red teaming the red team * Targeting the blue team * Leveraging the blue team's endpoint protection as C2 * Social media and targeted advertising * Targeting telemetry collection to manipulate feature development * Attacking artificial intelligence and machine learning * Operation Vigilante – using the red team to fix things * Emulating real-world advanced persistent threats (APTs) * Performing tabletop exercises * Summary * Questions 6 Section 2: Tactics and Techniques * Section 2: Tactics and Techniques 7 Chapter 5: Situational Awareness – Mapping Out the Homefield Using Graph Databases * Chapter 5: Situational Awareness – Mapping Out the Homefield Using Graph Databases * Understanding attack and knowledge graphs * Graph database basics * Building the homefield graph using Neo4j * Exploring the Neo4j browser * Creating and querying information * Summary * Questions 8 Chapter 6: Building a Comprehensive Knowledge Graph * Chapter 6: Building a Comprehensive Knowledge Graph * Technical requirements * Case study – the fictional Shadow Bunny corporation * Mapping out the cloud! * Importing cloud assets * Loading CSV data into the graph database * Adding more data to the knowledge graph * Augmenting an existing graph or building one from scratch? * Summary * Questions 9 Chapter 7: Hunting for Credentials * Chapter 7: Hunting for Credentials * Technical requirements * Clear text credentials and how to find them * Leveraging indexing techniques to find credentials * Hunting for ciphertext and hashes * Summary * Questions 10 Chapter 8: Advanced Credential Hunting * Chapter 8: Advanced Credential Hunting * Technical requirements * Understanding the Pass the Cookie technique * Credentials in process memory * Abusing logging and tracing to steal credentials and access tokens * Windows Credential Manager and macOS Keychain * Using optical character recognition to find sensitive information in images * Exploiting the default credentials of local admin accounts * Phishing attacks and credential dialog spoofing * Performing password spray attacks * Summary * Questions 11 Chapter 9: Powerful Automation * Chapter 9: Powerful Automation * Technical requirements * Understanding COM automation on Windows * Achieving objectives by automating Microsoft Office * Automating and remote controlling web browsers as an adversarial technique * Summary * Questions 12 Chapter 10: Protecting the Pen Tester * Chapter 10: Protecting the Pen Tester * Technical requirements * Locking down your machines (shields up) * Improving documentation with custom Hacker Shell prompts * Monitoring and alerting for logins and login attempts * Summary * Questions 13 Chapter 11: Traps, Deceptions, and Honeypots * Chapter 11: Traps, Deceptions, and Honeypots * Technical requirements * Actively defending pen testing assets * Understanding and using Windows Audit ACLs * Notifications for file audit events on Windows * Building a Homefield Sentinel – a basic Windows Service for defending hosts * Monitoring access to honeypot files on Linux * Alerting for suspicious file access on macOS * Summary * Questions 14 Chapter 12: Blue Team Tactics for the Red Team * Chapter 12: Blue Team Tactics for the Red Team * Understanding centralized monitoring solutions that blue teams leverage * Using osquery to gain insights and protect pen testing assets * Leveraging Filebeat, Elasticsearch, and Kibana * Summary * Questions 15 Assessments * Chapter 1 * Chapter 2 * Chapter 3 * Chapter 4 * Chapter 5 * Chapter 6 * Chapter 7 * Chapter 8 * Chapter 9 * Chapter 10 * Chapter 11 * Chapter 12 16 Another Book You May Enjoy * Another Book You May Enjoy * Leave a review - let other readers know what you think You're currently viewing a free sample. Access the full title and Packt library for free now with a free trial. DEFINING METRICS AND KPIS Measuring the effectiveness of an offensive security program and how it helps the organization remove uncertainty around its actual security posture and risks is one of the more difficult questions to explore and answer. When it comes to metrics, we need to distinguish between what I refer to as internal versus external adversarial metrics. TRACKING THE BASIC INTERNAL TEAM COMMITMENTS Internal metrics are those that the pen test team use to measure and hold themselves accountable. Some organizations call these commitments or objectives and key results (OKRs). Initially, the metrics might be quite basic, and comparable to project management KPIs: * Performing x number of penetration tests over a planning cycle and delivering them on time * Committing to performing a series of training sessions in H2 * Delivering a new Command and Control toolset in Q4 * Delivering a custom C2 communication channel by Q1 * Growing the team by two more pen... Unlock full access CONTINUE READING WITH A SUBSCRIPTION PACKT GIVES YOU INSTANT ONLINE ACCESS TO A LIBRARY OF OVER 7,500 PRACTICAL EBOOKS AND VIDEOS, CONSTANTLY UPDATED WITH THE LATEST IN TECH Start a 7-day FREE trial Previous Section End of Section 5 Next Section -------------------------------------------------------------------------------- Your notes and bookmarks All Bookmarks Notes --------------------------------------------------------------------------------