6.
Emulating the Adversary
In the following chapter we are going to review the concept of adversary emulation and some of the open source tools available to carry it out. We are going to start covering the design of an emulation plan following MITRE ATT&CK APT3 example. Then, we are going to cover different set of tools (Atomic Red Team, MITRE Caldera, Mordor Project, C2 Matrix) that we can use to emulate those threats. Finally, we are going to close the chapter with a quiz of questions involving the core topics we have discussed.
In this chapter we’re going to cover the following main topics:
- Creating an Adversary Emulation Plan
- How to emulate the threat?
- Test Yourself