Blue-Team-as-Code: Lessons From Real-world Red Team Detection Automation Using Logs
Building on last year's SANS blue team automation talk, we'll focus on some real-world examples of how implementing blue team detection automation in code can be leveraged to better detect attack/red-team activity in logs, including visualization, pivoting, and decoding of malicious activity. We will be using open source frameworks such as sigma as a basis for some hunting hypotheses along with python and Jupyter notebook-based automation. We will share some code examples as well as our experiences with blue team detection automation in code, including examples of some of the common blind spots, including an example of oath2 permission grants exploitation in O365, and how these blind spots can be addressed by a blue team. You'll also see a practical demo of blue team code automation helping detect a red team in action.
Oleg Kolesnikov, Vice President, Securonix; Cybersecurity Instructor, Northeastern University
Den Iuzvyk, Senior Security Researcher,, Securonix
View upcoming Summits: http://www.sans.org/u/DuS
Download the presentation slides (SANS account required) at https://www.sans.org/u/1iaE
#BlueTeamSummit #BlueTeamAsCode