Blue-Team-as-Code: Lessons From Real-world Red Team Detection Automation Using Logs

Subscribers:
23,600
Published on ● Video Link: https://www.youtube.com/watch?v=fz6SYlfvc-Y



Category:
Vlog
Duration: 37:15
1,322 views
33


Building on last year's SANS blue team automation talk, we'll focus on some real-world examples of how implementing blue team detection automation in code can be leveraged to better detect attack/red-team activity in logs, including visualization, pivoting, and decoding of malicious activity. We will be using open source frameworks such as sigma as a basis for some hunting hypotheses along with python and Jupyter notebook-based automation. We will share some code examples as well as our experiences with blue team detection automation in code, including examples of some of the common blind spots, including an example of oath2 permission grants exploitation in O365, and how these blind spots can be addressed by a blue team. You'll also see a practical demo of blue team code automation helping detect a red team in action.

Oleg Kolesnikov, Vice President, Securonix; Cybersecurity Instructor, Northeastern University
Den Iuzvyk, Senior Security Researcher,, Securonix

View upcoming Summits: http://www.sans.org/u/DuS
Download the presentation slides (SANS account required) at https://www.sans.org/u/1iaE
#BlueTeamSummit #BlueTeamAsCode







Tags:
sans institute
blue team
blue team operations
blue team summit
sans blue team summit
oleg kolesnikov
den iuzvyk
sans institute blue team summit
blue team as code
red team
red team detection
red team detection automation
logs