ATTPwn: Adversarial Emulation and Offensive Techniques Collaborative Project

Collapse
X
 
  • Time
  • Show
Clear All
new posts
  • aNullValue
    Moderator
    • Jun 2019
    • 584

    #1

    ATTPwn: Adversarial Emulation and Offensive Techniques Collaborative Project

    ATTPwn is a computer security open source tool designed to emulate adversaries. The tool aims to bring emulation of a real threat into closer contact with implementations based on the techniques and tactics from the MITRE ATT&CK framework. The goal is to simulate how a threat works in an intrusion scenario, where the threat has been successfully deployed. It is focused on Microsoft Windows systems through the use of the Powershell command line. This enables the different techniques based on MITRE ATT&CK to be applied. ATTPwn is designed to allow the emulation of adversaries as for a Red Team exercise and to verify the effectiveness and efficiency of the organization's controls in the face of a real threat.
    Furthermore, ATTPwn provides the possibility of knowledge transfer between users. This knowledge is exchanged through implementation of ATT&CK techniques. This new user-generated knowledge can be shared with the community through a special feature within ATTPwn. The collaborative part of ATTPwn enhances the know-how that every users can bring to the community in the shape of offensive techniques, which are always being mapped with ATT&CK.

    Speaker(s): Fran Ramirez, Pablo Gonzalez

    Location: Red Team Vlg

    Discord: https://discord.com/channels/7082082...77357820411944

    Event starts: 2020-08-07 21:45 (09:45 PM) PDT (UTC -07:00)

    Event ends: 2020-08-07 22:45 (10:45 PM) PDT (UTC -07:00)

    For the most up-to-date information, please either visit https://info.defcon.org, or use HackerTracker, which is available for iOS and Android. This is an automated message, and this data was last modified 2020-07-29T01:25 (UTC).
    Starts
    August 7, 2020 21:45
    Ends
    August 7, 2020 22:45
    Location
    Red Team Vlg
Working...