0% found this document useful (0 votes)
379 views

Foundations of Breach & Attack Simulation: Lab Guide

This document provides a lab guide for exercises using a breach and attack simulation tool. The exercises include: 1) running a continuous security validation assessment to test content filtering controls, 2) reviewing the results of the assessment, including overall scores and specific scenario details, and 3) creating a new assessment using a FIN6 template to emulate the tactics of that threat group. The guide instructs students to perform specific configuration and review tasks within the tool to gain hands-on experience with its functionality.

Uploaded by

Jonathan Gill
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
379 views

Foundations of Breach & Attack Simulation: Lab Guide

This document provides a lab guide for exercises using a breach and attack simulation tool. The exercises include: 1) running a continuous security validation assessment to test content filtering controls, 2) reviewing the results of the assessment, including overall scores and specific scenario details, and 3) creating a new assessment using a FIN6 template to emulate the tactics of that threat group. The guide instructs students to perform specific configuration and review tasks within the tool to gain hands-on experience with its functionality.

Uploaded by

Jonathan Gill
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

 

Lab Guide 
Foundations of Breach & Attack 
Simulation 
 

 
Revision 2020.11.02 

 
  

Table of Contents 
Foundations of Breach & Attack Simulation Lab Guide 3 
Exercise 1: Continuous Security Validation 4 
Exercise 2: Continuous Security Validation - Reviewing The Data 8 
Exercise 3: FIN6 Emulation 11 
Exercise 4: MITRE ATT&CK Mapping 15 
Exercise 5: Reporting 18 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 

  

Foundations of Breach & Attack Simulation 


Lab Guide 
 

This lab guide is meant to be used in conjunction with the Foundations of Breach & 
Attack Simulation course. With these labs, we hope to provide you with some 
hands-on, practical experience with BAS tools. Please note that all of the tasks you 
are performing within the BAS tool can have a manual approach. Since the goal of 
this course is to familiarize you with putting that approach into action, we have 
decided to use the AttackIQ platform to assist in running these labs. 

   

 

  

Exercise 1: Continuous Security Validation 


 

1. Click on the ​CREATE NEW ASSESSMENT b


​ utton 
 

 
 
2. Click ​CHOOSE TEMPLATE​. 

 
 
3. On the Assessment Templates page, click the dropdown under ​Select 
template type​, and choose ​Security Controls​.

 
 

 

  
4. Find the ​Content Filtering​ assessment template on the page, and click it. 

 
5. Click ​Create New​. 
6. Add both assets to the Assessment. 
a. Click the M
​ anage Assets ​button 
b. Click the checkboxes of B
​ OTH​ assets listed. 

 
c. Click ​Apply 

 

  
7. Under the assets, where it lists the tests configured, click on the three dots 
under the A
​ CTION​ column for the test name ​Social Media sites​. 

 
8. Click ​Manage Scenarios​. 
9. Under the details column, click on the icon to see the details for ​Test Web 
access to Social Media site Facebook​. 

 

  
10. On the resulting scenario details page for Test Web Access to Social Media 
Site Facebook, read and make a note of the scenario description. 
11. Click on the heading for ​Scenario Configuration​ to expand the configuration 
details. 

 
 
12. Review the configuration settings and make note of the Headers sent during 
the test. Also, make a note of the method being used. 
13. Return to the assessment page and click D
​ one ​to close the scenario listing for 
the Social Media sites test. 
 

 
 
14. Click the C
​ ontinue​ button in the bottom right-hand corner of the page. 
15. Click the R
​ un Now​ button. 

You have completed Lab Excercise 1. Please r​ eturn to the 


course​ videos for more information on the next lab.   

 

  

Exercise 2: Continuous Security Validation - 


Reviewing The Data 
With the testing from Excercise 1 completed, we can begin to explore the results of 
the emulation. 

1. Note the results in the top three panels for Overall Combined, Overall 
Prevention, and Overall Detection scores. 

2. In the Overall Detection score panel, expand Security Controls to see 


detection rates for security controls involved in testing. 
 

 
 

 

  

3. Under the ​Results​ menu item, click on S


​ ummary 
 

4. Scroll down the results page until you find the Scenario results for T
​ est Web 
access to Social Media site Facebook​. 

5. Click on the entry for T


​ est Web access to Social Media site Facebook​. 

 

  

6. If you’ve forgotten what this scenario is trying to accomplish, click the ?


​  
icon next to the scenario title. 
 

 
 

7. Expand the A
​ ctivity Details​ and make note of the response code received vs. 
the response code anticipated. 

8. Expand the I​ NDICATORS OF COMPROMISE (IOCS) DETAILS 

a. Make a note of the following information: 

i. Destination: 

ii. HTTP Method 

iii. Protocols 

iv. Request Path 

v. Source Port 

You have completed Lab Excercise 2. Please ​return to the 


course​ videos for more information on the next lab. 

 
10 
  

Exercise 3: FIN6 Emulation 


1. Click on the three horizontal lines in the top left-hand corner of the screen to 
open the main menu. 

 
2. Click on A
​ SSESSMENT​ in the main menu. 

 
11 
  
3. Click on the ​CREATE NEW ASSESSMENT b
​ utton 
 

 
 
4. Click ​CHOOSE TEMPLATE​. 

5. On the Assessment Templates page, click the dropdown under Select 


template type, and choose Operationalized Threat Analysis. 

 
 

 
12 
  
6. Find the ​FIN6​ assessment template on the page, and click it. 

 
7. Click ​Create New 
8. Add both assets to the Assessment. 
a. Click the M
​ anage Assets ​button 
b. Click the checkboxes of B
​ OTH​ assets listed. 

 
c. Click ​Apply 

 
13 
  
9. Under the assets, where it lists the tests configured, click on the three dots 
under the A
​ CTION​ column for the test name ​Lateral Movement​. 

 
10. Click ​DELETE TEST​. 
11. Click ​OK 
12. Click the C
​ ontinue​ button in the bottom right-hand corner of the page. 
13. Click the R
​ un Now​ button. 

You have completed Lab Excercise 3. Please r​ eturn 


to the course​ videos for more information on the 
next lab. 

   

 
14 
  

Exercise 4: MITRE ATT&CK Mapping 


1. In the left-hand menu, under ​Results​, click on ​MITRE ATT&CK  
2. Review the results for Prevention. 
3. Click on the ​Detection r​ adio button to toggle the view to detection results. 

 
4. Click the C
​ ombined​ radio button to toggle the view to combined detection 
and prevention results. 
5. Click on the Discover tactic column heading. 

 
6. On the Results page you will see a listing of results that have been filtered to 
display scenarios from the FIN6 assessment that fall under the ATT&CK tactic 
of Discovery. 

 
15 
  
7. Click on the line item for Get Hardware Model Using WMI (either one is 
okay). 

8. Click the ?
​ ​ icon next to the scenario title and read the scenario description to 
get a better understanding of what this scenario is trying to accomplish. 

9. Make a note of the WMI command used to obtain the hardware model, you 
will need this information for your final exam. 

 
16 
  

10. Review the Activity Details to see the output or error code for the scenario. 

11. Review the Indicators of Compromise (IOCs) Details. 

You have completed Lab Excercise 4. Please r​ eturn to the 


course​ videos for more information on the next lab. 

   

 
17 
  

Exercise 5: Reporting 
1. Click on F
​ IN6 (Results) ​in the breadcrumb navigation at the top of the page. 

 
2. Click on R
​ eports​ in the left-hand menu. 
3. Click the A
​ DD Report b
​ utton. 
4. Give your report a name, select MITRE ATT&CK Report as the report type, and 
chose the assessment you ran in previous exercises. 

 
18 
  
5. Click ​SAVE CHANGES​. 
6. Click on the three vertical dots at the end of the row for the report you just 
created. 

 
 
7. Click ​VIEW​. 

 
8. Review the report to get a better understanding of how the lab environment 
responded to different MITRE ATT&CK techniques.   

 
19 

You might also like