Incident Response workshop: Difference between revisions
Ebiddlecome (talk | contribs) m Incident Response and the ATT&CK Matrix Workshop |
added link to workshop room |
||
Line 23: | Line 23: | ||
Visit [https://samsclass.info/ samsclass.info] to access the workshop materials. | Visit [https://samsclass.info/ samsclass.info] to access the workshop materials. | ||
'''Link to workshop room'''<br> | |||
[https://workshops.hope.net/b/dan-pm5-gbh Link to workshop room] |
Latest revision as of 11:27, 25 July 2020
Practice techniques to detect, analyze and respond to intrusions. We will construct targets and attackers on the Google cloud, and send attacks using Metasploit and Caldera to emulate APT attackers. We will monitor and analyze the attacks using Splunk, Suricata, Sysmon, Wireshark, Yara and online analysis tools including PacketTotal and VirusTotal.
We will cover the ATT&CK Matrix in detail, which enumerates threat actors, tactics and techniques, so red and blue teams can better communicate and work together to secure networks.
The workshop is structured in a CTF format. Each participant works at their own pace. The techniques will be demonstrated, with complete step-by-step instructions to lead beginners through the easy challenges. There are also harder challenges for more experienced participants. We will help participants as needed, to ensure that everyone learns new techniques.
Participants need a credit card and a few dollars to rent Google Cloud servers. We will use Debian Linux and Windows Server 2016 systems. All the tools we will use are freely available, and all the training materials will remain available to everyone after the workshop ends.
Visit samsclass.info to access the workshop materials.
Link to workshop room
Link to workshop room