Skip to content

Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].

Notifications You must be signed in to change notification settings

TH3xACE/EDR-Test

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

45 Commits
 
 
 
 
 
 

Repository files navigation


EDR-Test

#CobaltStrike #AggresorScript #EDR #MITREAttack #PurpleTeam

Who said Cobalt Strike was meant to be used only as an offensive tool (Red Team)?

As part of our Purple Team activity, I am involved in testing different EDRs solutions to evaluate their detection capabilities by emulating attacks using Techniques, Tactics, and Procedures (TTPs) used by adversaries. I wanted to automate the tests, to make it easier for us as well as to allow us to make a consistent and effective comparison between the different solutions.

My first consideration was the Atomic Red Team project. It is a really nice project and initiative. Unfortunately, the project did not allow me to meet some of my objectives such as

  • not to use powershell
  • to have better flexibility
  • some custom (ninja) features

Link: https://github.com/redcanaryco/atomic-red-team

After some online research (thanks Dr. Google) to find some other (FREE) alternatives. I came to the conclusion that if I wanted to meet all my objectives, I needed to get my hands dirty. So I decided to go for my own project. But which Programming Language to use? I decided to use Cobalt Strike's Aggressor Script (a superset of the Sleep language) since at that time, I was aiming to improve my coding skills with Aggressor Scripts (.cna) and in addition it would allow me to achieve all my objectives, it was the way to go.

For those who don't know what I am talking about!

What is Cobalt Strike ?

Cobalt Strike is a platform for adversary simulations and red team operations. The product is designed to execute targeted attacks and emulate the post-exploitation actions of advanced threat actors.

Adversary Simulations and Red Team Operations are security assessments that replicate the tactics and techniques of an advanced adversary in a network. While penetration tests focus on unpatched vulnerabilities and misconfigurations, these assessments benefit security operations and incident response.

What is Aggressor Script ?

Aggressor Script is a scripting language for red team operations and adversary simulations inspired by scriptable IRC clients and bots. Its purpose is two-fold. You may create long running bots that simulate virtual red team members, hacking side-by-side with you. You may also use it to extend and modify the Cobalt Strike client to suit your needs thru the use of Aggressor Script '.cna' files.

The answer was as simple as the MITRE ATT&CK® framework. The MITRE ATT&CK® framework, which stands for MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK), is a knowledge base for modeling the behavior of a cyber adversary.

Link: https://attack.mitre.org/

The framework was used to build the CNA scripts with the different tests, it should be noted that at the time of the writing, I have not yet implemented all the tests from the framework but only those with high interest and relevant to the objectives were prioritised in the development of the script.

Below is the menu where it is possible to either select for unit tests or multiple tests in either a user or admin context.

Project

The [P] flags indicates that the test makes use of a socks proxy.

This is a portion of the CNA code for the menu:

Project
Project

The tests are split as follows:

  1. User Unit Test
  2. Admin Unit Test
  3. User All Tests
  4. Admin All Tests

Tests implemented : More than 60 tests (including variant test**) - 49 unique tests for TTPs

** Some tests can be performed using either native windows executable or Cobalt Strike functions or external tools (Python, C#,...).

Project

Example of output on Cobalt Strike

Project

The screenshot below shows information about some tests (variant test) (whether proxy is used, a .NET binary, cobalt strike function, Windows binary,...)

img-broken

Multiple Test

The multiple test can be either in the user or admin context. It is also possible to specify the delay between each test (eg. 5 mins).

img-broken

This functionality is important since it can be used to match detection on the EDR console vs TTPs used duirng the test. The time the tests were performed can be use to perform this match.

img-broken

Due to security concerns, I can't provide the solutions that I have tested nor the results but the project below might give you some insight. It should also be noted that the results presented by the below project is relevant at a specific point in time due to the fact that some of the EDRs detection capability have evolved over time.

Project: https://attackevals.mitre-engenuity.org/enterprise/participants/?rounds=carbanak_fin7

img-broken

Results on comparing the EDRs solution detection capability with reference to TTPs.

Link: "https://mitre-evals.kb.europe-west1.gcp.cloud.es.io:9243/app/dashboards#/view/c2184e40-a13a-11eb-9d57-5de8e1bfb5ea?_g=(filters:!(),refreshInterval:(pause:!t,value:0),time:(from:now-15m,to:now))"

The project EDR-Test is not published online for now but can be shared if you contribute (at least 5 tests - can include variant -> Create a Pull Request) or for sponsors contact me on adblue2017[@]gmail[.]com

List of already implemented tests : /img/test-implemented.png

About

Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Sponsor this project

Packages

No packages published