On This Page

Tactical Response

Attack Research | August 1-2



Overview

Tactical Response is a multidisciplinary approach to understanding the methodologies, techniques, and tools for both offensive and defensive security. This 2 day course introduces a tactical approach for instrumenting, alerting, and responding for enterprises. Using a combination of new tools, and uncommon techniques students will learn how to defend a network against today's evolving threats. Real world attacks concentrate heavily on a number of methodologies including; compromising systems without depending upon standard exploits, Personal Security Product (PSP) evasion, unique stealth approaches, persistence mechanisms, and varying degrees of collection strategies. Attendees will learn how real attackers use these strategies and how to detect, alert, respond, and defend against these techniques.

Students will learn:
  • How to manipulate enterprise tools and infrastructures in unusual ways for better security
  • Build and employ custom logging tools for detecting lateral movement, persistence mechanisms, data targeting, and exfiltration
  • How to provide actionable data to help decision makers
  • New techniques to help drive rapid intelligence from files and systems.
  • Properly defend against and respond to incidents on a network
  • Offensive mindset for defensive purposes

Students will get the chance to work with real "APT" tools and see the unique differences between how they are used in real attacks vs the penetration testing tools used today. These differences will help students learn how to truly detect real adversaries.

Topics Covered:
  • Real offensive mindsets, not penetration testing mindsets, for enterprise response
  • Proper response mechanisms and communication
  • Host and network indicator extraction for enterprise results
  • Quickly gather and identify data for incident use
  • Host logging and auditing
  • Leveraging active directory, AV, and other tools in unique ways for alerting
  • PCAP and network intelligence extraction
  • Leveraging windows syscalls for alerting across an enterprise
  • Advanced host and file triage capabilities
  • Host command and process monitoring across a host

Who Should Take this Course

This course is well-suited to incident responders and in general any defenders. This course is also well suited for the offensively focused minds. This class can help penetration testers learn what NOT to do.

Student Requirements

8.0 and above (which can be obtained through a demo license). To run multiple machines usually means at least 4 gig's of memory is needed.

Student laptops must be running either OSX, Linux, or Windows and must have the ability to disable all antivirus, sniff traffic, adjust firewalls, etc.

We encourage students to have a copy of IDA Pro version 6.0 or greater. Students are responsible for bringing a XP or Windows 7 VMware virtual machine that can be instrumented and infected with malware.

Students must have:
  • Familiarity with scripting languages such as Python/Perl/Ruby
  • A familiarity with Windows and Linux administration.
  • Familiarity with the malware analysis and reverse engineering malware processes

What Students Should Bring

See Student Requirements

What Students Will Be Provided With

Students will walk away from the class with full documentation and the entire custom and non-custom tools that we have given them or they have designed in class. Students walk away from AR training sessions with more than just the "usual" training materials but a wealth of knowledge for defending networks.

Trainers

Russ Gideon (rgideon@attackresearch.com) Russ has many years of experience in information security fulfilling many diverse roles from being a core component of an Incident Response operation to running effective Red Teams from across the United States government. Russ excels both at malware reverse engineering, which enables him to deeply understand how the attackers do what they do, as well as at high end Red Teaming where he has to penetrate sophisticated and well protected high value systems. Russ currently serves as the Director of Malware Research at Attack Research.

Colin Ames (amesc@attackresearch.com) Colin is a security researcher with Attack Research LLC where he consults for both the private and public sectors. He's currently focused on Pen testing, Exploit Development, Reverse Engineering, and Malware Analysis.