The course is divided into three parts, beginning with preliminaries and followed by the framework and methodology for designing Adversary Emulation exercises for specific objectives. The training is concluded with the practical aspects of incorporating exercise results into the organizational cyber security program. The included hands-on exercises allow the attendees to experience the attacker's side of planning and executing cyber-physical attacks as well as practicing adversary emulation tasks.
Midnight Blue and Dr. Marina Krotofil from MK|Security jointly offer this high-paced course aimed at providing the attendees with practical knowledge on how to emulate realistic attacker behaviors and exploitation techniques for ICS/OT environments. This course will be offered for the first time at Black Hat Europe 2024.
EXERCISE 1: Discovery - Finding sensitive and confidential engineering documentation.
EXERCISE 2: Discovery - Analysis of a crown-jewel asset. Practical overview of the Engineering Workstation and OPC server, and what makes them valuable attack vantage points.
EXERCISE 3: Discovery - Understanding attacker efforts. Analyzing Modbus TCP traffic without context.
EXERCISE 4: Damage - Constructing a damage attack on a demo process and mapping attack instances to MITRE ICS ATT&CK
EXERCISE 5: Integration - Given a specific use-case, the participants will be tasked to design adversary emulation exercises for a selection of objectives while maximizing Return on Investment (ROI).
Upon course completion, all students should be able to:
- Understand the evolution of the ICS/OT threat landscape and the rationale behind ongoing attack campaigns; have reasonable anticipation of future threats.
- Design tailored adversary emulation exercises and their variations (Red vs. Blue or Purple Team exercises, pentests, table-top exercises) for given OT environments.
- Assist with an informed risk assessment to fulfill safety, operational, business and regulatory requirements (e.g., NIS/NIS2, IEC 62443, etc.).
- Contribute to designing defensible network and systems architectures with a focus on preventive security controls and early detection of compromise.
- Assist with developing realistic incident response playbooks.
Students will be provided with:
- Digital copy of the slides deck
- Printed version of the key knowledge concepts and exercises
- VMs with tooling & exercise tasks
Students should have familiarity with:
- Basics of OT/ICS concepts and risk assessment principles
- The Cyber Attack Lifecycle
- The MITRE ATT&CK framework (basic familiarity)
- MITRE ICS ATT&CK (basic familiarity)
Students should bring a laptop with the following requirements:
- Configured account with Administrator privileges and ability to disable security software if necessary
- Ability to access internet
- Web browser to access online parts of exercises
- Ability to access Wi-Fi
- 16GB RAM or more
- 100GB free disk space or more
- Intel VT / AMD-V enabled
- Recent version of VirtualBox software (installed & tested before course kick-off) to run provided VM
NOTE: Do not bring a locked down or regular production laptop to this course since this might limit the ability to install required software
Black Hat Europe 2024
Attendance: In-Person
Trainers : Dr. Marina Krotofil (MK|Security), Jos Wetzels (Midnight Blue)
Dates : December 9-10
Location: London, United Kingdom
Register
All items