The latest from Atomic Red Team |
|
|
|
|
|
|
|
Getting Started with Atomic (SANS HackFest 2022) |
|
Maintainer Carrie Roberts gives an extensive overview of the purpose and methodology behind Atomic Red Team, how to navigate the project, and some useful emulation scenarios for new and seasoned users alike. |
|
|
|
|
|
Atomic habits, atomic tests |
|
Make it habitual! Testing is not one-and-done, so establishing a regular testing schedule is one of the best things you can do for your security posture. Keith McCammon explores how you can set up a testing cadence based on the book Atomic Habits by James Clear. |
|
|
|
|
Introducing T1201: AWS Password Policy |
|
This new test from contributor cyberbuff verifies the current AWS password policy and retrieves its details for the tester. |
|
|
|
T1112: Mimic Ransomware Registry Modification |
|
Contributor Leomon5 added two new tests to the Modify Registry technique, based off of research from Trend Micro, intended to emulate Mimic ransomware. These tests attempt to emulate the modification of the target’s registry to enable multiple user and RDP sessions. |
|
|
|
|
Top contributors
- MSAdministrator
- biot-2131
- Haggis
|
|
New contributors
- yogisec
- MSAdministrator
- yonatan424
- biot-2131
- ForensicITGuy
- dlee35
- aman143kri
- tvjust
- devapriya16
|
|
|
AntiSyphon Training: Attack Emulation Tools |
|
Carrie Roberts hosts this training on attack emulation tools, intended to help participants measure, monitor, and improve security controls by running scripted attacks (like those found in Atomic Red Team, of course!). |
|
|
SIGN UP |
|
|
|
|
|
|
|