| The latest from Atomic Red Team |
| |
|
|
| |
|
|
|
| |
| Purple Teaming with ARTifacts |
| |
| Learn how to run atomic tests hands-free on endpoints! Using Velociraptor artifacts, Wes Lambert covers purple teaming logic and atomic test setup for purple teamers short on time. |
|
|
|
|
| |
| Sniffing out BloodHound |
| |
| Although it has legitimate uses, BloodHound can be a real threat to environments running Active Directory. Using Atomic Red Team test 3 (Run Bloodhound from Memory using Download Cradle) in T1059.001, Sai Prashanth Pulisetti showcases how to detect BloodHound using Windows system logs. |
|
|
|
|
| Atomic Spotlight: Persistence with Command Process Auto Run Registry Key |
| |
| Need persistence? Maintainer Carrie Roberts discusses more persistence methods, this time with a spotlight on persistent code execution through Windows command prompt (cmd.exe). |
|
|
|
| Compile After Delivery |
| |
| Adversaries often deliver uncompiled code onto a target's system. In this tutorial, Parth (a Security Analyst from SharkStriker) walks you through Invoke-AtomicRedTeam and the Compile After Delivery tests (T1027.004). |
|
|
|
|
Top contributors
- clr2of8
- packetzero
- blueteam0ps
- tr4cefl0w
- cnotin
|
|
New contributors
- cigdemtosun
- 0xv1n
- codec-hasqui
|
|
| |
| Conference Feature: DEATHCon 2022 - Mapping Detection Coverage |
| |
| In this presentation, Jared Atkinson and Jonathan Johnson discuss the importance of testing telemetry coverage and using abstraction to build a representative sample set of atomic tests to validate detection coverage. |
| |
| |
WATCH NOW |
|
| |
|
| |
|
|
|