Are there any adversaries lurking within AcmeCorp's network, even without any events being triggered by Indicators of Compromise (IOCs)?
In this educational challenge, you will assume the role of a security analyst and be asked to identify any undetected threats on AcmeCorp's network. To do this you will make use of Mitre ATT&CK™, which is a knowledge base of adversarial behavior based on real-world observations. ATT&CK™ allows analysts to hunt for patterns of behavior rather than artifacts such as hashes, IPs, or Domains. Why is this important? Well, according to 'The Pyramid of Pain' by David Bianco, while it is very easy for attackers to change these artifacts it is much harder for them to change their Tactics, Techniques, and Procedures (TTPs). Therefore, TTPs are a more reliable way of identifying adversary behavior.
The challenge is set up with several exercises set around the technical goals the adversary is trying to achieve (ATT&CK™ Tactics), for example, Initial Access, Persistence, Privilege Escalation, Command and Control. You will be asked to detect any techniques being used by an adversary to achieve these goals.
The workshop will use FortiAnalzyer, FortiEDR and FortiSIEM for analytics and reporting, and for data sources will use FortiGate, FortiWeb, FortiMail, FortiDeceptor and FortiSandbox.
In this Fast Track attendees will gain hands-on experience developing and understanding the analytics needed to discover the techniques used by adversaries during a cyber security breach.