Purple Team - Offensive and Defensive collaborative simulation

AdamQuesi 56 views 23 slides Aug 08, 2024
Slide 1
Slide 1 of 23
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23

About This Presentation

Bridging the Gap Between Red and Blue Teams. Purple Team operations are not penetration tests. They are
not meant to deliver a list of vulnerabilities in a specific
application or service.
Instead, they are meant to better understand our
organization’s ability to detect and respond to realworld at...


Slide Content

Purple Teaming
1 @Qwesi_RED
Bridging the Gap Between Red and
Blue Teams
TALK BY: ADAM NURUDINI

2@Qwesi_Red
●Offensive Sec. Consultant @ Sekuro(Australia)
●Co-Founder @NetwatchTechnologies
●Security Consultant @ISA Ghana
●Core Member @Africa HackonGhana
●Previous Experience
○Head of SOC @ CBG
●My interests
○Application & Infrastructure Security
○Code Review & Code Assisted Pentest
○Adversary Emulation
○Security Operations (Engineering)
●Certifications
○EWPTX, PNPT, CCNA, CCNP, CASP, CRTP, CEH,
ISO27001, ISO27032 etc.
About Me

3@Qwesi_Red
1.Purple Teaming Overview
2.Blue Vs Red
3.Why Purple teaming
4.Goals of Purple teaming
5.Purple Teaming Workflow
6.Table-Top Exercise with Demo
7.Final Words
Agender

The opinions expressed in this
presentation and in any corresponding
comments are the personal opinions of
the original authors, not those of my
employer.
Disclaimer

Your Full Attention
Presentation About
Purple Teaming
Hands-on Demo
and
memes

Background:-BLUEVs RED
Purple Teaming
Core Functions of Red and Blue Teams
Blue Team
Red Team
Role: Offensive Security
Objective: To simulate real-world attacks to identify and exploit
vulnerabilities in an organization's systems and defenses.
Role: Defensive Security
Objective: To protect the organization's assets by detecting,
preventing, and responding to cybersecurity incidents.

Challenges:-BLUEVs RED as they work in isolation
Purple Teaming
Blue Team Red Team
•Misaligned goals
•Focus on Exploitation:
•Missed Detection Opportunities

Purple Teaming
Purple Teaming
Purple Teaming IS NOT a team, but a mindset
Moving Red/Blue from adversary to ally
Align under one goal: secure the organization
Planning + collaboration = efficient and effective evaluations
If anything, it is a “team of teams”

9
Purple Teaming
Why is Purple Teaming Important?
Purple Team operations are not penetration tests. They are
not meant to deliver a list of vulnerabilities in a specific
application or service.
Instead, they are meant to better understand our
organization’s ability to detect and respond to real-
world attacks.
●Knowing your enemy is good
○Defensive knowledge makes you a better attacker
○Attacking knowledge makes you a better defender
●Knowing your ally is even better
○Improve collaboration across teams
○Technical, procedural, etc.

10@Qwesi_RED
Purple Teaming
Goals
At a high level, the goals of an operation generally fall into one of the
following categories:
1.To gauge the effectiveness of existing defensive capabilities (Is our SIEM capable of
detecting a compromised admin account?)
2.To practice and refine our procedures for responding to a breach (Do our runbooks
make sense? Can anything be automated?)
3.To understand our ability to detect and respond to a specific type of threat (What would
happen if we were targeted by a ransomware operator?)

Purple Teaming Workflows –High Level
Purple Teaming

Workflows 1 –Attack Planning
Purple Teaming
Brainstorming: Propose and discuss an initial idea.
Tools: VectrA free, closed-source Purple Team planning and reporting
tool.
1.This might be inspired by;
2.Threat intelligence
3.New systems
4.Detection capabilities
5.some other hypothesis requiring validation (blue team skills testing or
Playbooks and processes effectiveness).

Workflows 2 –Attack Emulation
Purple Teaming
Develop Capabilities: The Red Team will create and test the infrastructure and
tooling required to execute each TTP. Whenever possible, these should be
automated using either GitLab CI pipelines or MITRE Caldera..
Emulate Attack(s): Synchronous meeting to play and replay the attacksas
necessary.
Validate Detection & Response: An asynchronous discussion on what went
well, what could be improved, and what we would do differently next time around.

Workflows 3 –Operation Conclusion
Purple Teaming
Deliver Final Report :
Prepare and share the full report. This contains a detailed attack narrative with
an attack flow diagram, a MITRE ATT&CK heatmap, Vectrdiagrams on
technique outcomes and tooling efficiency, and relevant observations. This is
delivered via the issue itself.
Retrospective:
An asynchronous discussion on what went well, what could be improved, and
what we would do differently next time around.

Levels of Purple Teaming
Purple Teaming

Demo Planning
Purple Teaming
Brainstorming: Propose and discuss an initial idea.
The Idea or Level: We will be simulation attacks
to validate effectiveness of our security controls.
Use Cases:
1.Credential Discovery via SMB Shares, AD Objects
2.Password Spray in AD Environment
3.Kerberoasting& AS_REP Roasting
4.Ransomware Simulation

Demo 1 –Credential Discovery via SMB Shares, AD Objects
Purple Teaming
RED Team: Extract credentials from accessible SMB shares and Activity
Directory user attributes.
Tools: Netexec, CrackMapExec, Snafflerand Manspider
BLUE Team: File Shares (SMB traffic) monitoring and effectiveness
of SIEM, DLP, Password Managers and PAM solution.
Tools/Solutions:
1.SIEM to SMB traffic and security events
2.PAM to monitor Privileged accounts
3.DPL to detect data leakage.

Demo 2 –Password Spray in AD Environment
Purple Teaming
RED Team: Perform a password spray attack.
Tools: Curl, Nmap, and Sprayhound
BLUE Team: Detect and respond to the password spray attack.
Tools/Solutions:
1.SIEM: Monitor logon events
2.Password Policy

Demo 3 –Kerberoasting& AS_REP Roasting
Purple Teaming
RED Team:
Extract service account). hashes from Kerberos service tickets (Ticket
Granting Service, or TGS tickets.
Attempt to crack the AES-encrypted TGS tickets offline to extract the
service account keys and
Attempt to crack TGS tickets offline to extract the service account hashes.
Tools: Impacket, ADeNum, and Hashcat
BLUE Team: Monitor Event ID 4769 (A Kerberos service ticket or
TGS requests was requested) for unusual activity..
Tools/Solutions:
1.SIEM: Monitor Event ID 4769
2.EDR Solutions

Demo 4 –RansomewareSimulation
Purple Teaming
RED Team:
Execute a malware that simulate various ransomewareencryption
methods.
Tools: Knowbe4 ransomewaresimulator
BLUE Team: Monitor Event ID 4769 (A Kerberos service ticket or
TGS requests was requested) for unusual activity..
Tools/Solutions:
1.SIEM: Monitor antimalware events
2.EDR Solutions

Purple Teaming
Conclusion
Summary: Purple teaming bridges the gap between offensive and
defensive security.
Collaboration and regular exercises lead to a stronger security
posture.
Call to Action: Implement purple teaming exercises in your
organization to stay ahead of threats.

Thank you
22@Qwesi_RED

Shoutouts
23@Qwesi_RED
Huge Thanks to @M4yFly for building such an awesome AD lab.
@Gitlab for Purple Teaming Handbook.
@David Probinsky-Red Teaming & Physical Security (BSidesOrlando 2022)