Using MITRE Caldera to Emulate Threats in Your Environment
HTML-код
- Опубликовано: 8 июн 2022
- Red Team assessments and penetration tests are essential efforts to helping improve your defenses, but what if you wish to try this yourself? Caldera offers you a rich, automated, and open-source platform by which to test defenses and truly test how you are doing. It is also extremely helpful in learning how threat actors might approach your environment, and is a great instructional tool!
DISCLAIMER: Please do not use this in a live production environment without explicit consent and legal review. This tool - when used inappropriately - have the potential to affect performance or impact services. Use of this toolset against a non-production environment is highly recommended while building proficiency and doing most testing.
Caldera Home Page: caldera.mitre.org
Caldera Documentation: caldera.readthedocs.io/en/lat...
Caldera's GitHub: github.com/mitre/caldera
MITRE ATT&CK's Home Page: attack.mitre.org
MITRE's Center for Threat-Informed Defense: ctid.mitre-engenuity.org
Very concise well made video. Thank you.
Thank you
thanks for the great video, very informative
Thank you! Very glad you liked it and found something useful in it!
Awesome video, extremely helpful. I cant seem to import adversaries. What is the process to do so?
Hello Ben! the EMU plugin is the key to getting adversaries imported. you would need to activate this in the Configuration for plugins and then reboot the Caldera instance. Depending on how you deployed it, you may find it is a little flakey - I have my best luck with it running on an Linux (Ubuntu) VM, rather than as a container on local host.
wow!
I like your video but for me the text on the website is hard to read !
I am sorry for that - I will work on ensuring that readability is built into future videos!
@@MikeMcPhee101 Thank you !