<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Rolken</title>
	<atom:link href="https://rolken.cz/feed/" rel="self" type="application/rss+xml" />
	<link>https://rolken.cz/</link>
	<description>Cybersecurity company</description>
	<lastBuildDate>Thu, 26 Sep 2019 13:56:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://rolken.cz/wp-content/uploads/2018/04/cropped-logo-3-1-32x32.png</url>
	<title>Rolken</title>
	<link>https://rolken.cz/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>6 biggest security pain points​</title>
		<link>https://rolken.cz/6-biggest-security-painpoints/</link>
		
		<dc:creator><![CDATA[root]]></dc:creator>
		<pubDate>Tue, 23 Jul 2019 14:35:54 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://rolken.cz/?p=2972</guid>

					<description><![CDATA[<p>I found out I am dealing with InfoSec or cybersecurity for over 15 years with more than 10 years professionally. This means at least two things &#8211; I have seen quite a few things and I have a lot of blind spots. In my journey to uncover these blind spots, I asked my peers, colleagues,<a href="https://rolken.cz/6-biggest-security-painpoints/">[...]</a></p>
<p>The post <a href="https://rolken.cz/6-biggest-security-painpoints/">6 biggest security pain points​</a> appeared first on <a href="https://rolken.cz">Rolken</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>I found out I am dealing with InfoSec or cybersecurity for over 15 years with more than 10 years professionally. This means at least two things &#8211; I have seen quite a few things and I have a lot of blind spots.</p>
<p>In my journey to uncover these blind spots, I asked my peers, colleagues, customers, and friends how do they see security, what we are doing wrong and about their experiences. It is a very broad and open question for a distinct group of people &#8211; from CEOs, CIOs, CSOs via risk management, HR to software developers and pentesters.</p>
<p>I compiled those answers and ordered by a number of &#8220;complaints&#8221;.</p>


<h3 class="wp-block-heading">User experience sucks</h3>



<p>To hear complaints about quality of user interface (UI) and user experience (UX) of security tools is something I was not expecting. Seems like we, as a security community, got quite accustomed to bad UI, inconsistent dialogs, laggy interfaces, and misleading names. I wanted to oppose but then I took a look at how junior or newbies are working with tools like SIEM, vulnerability scanners and&#8230; Just visit&nbsp;<a href="https://userinyerface.com/" target="_blank" rel="noreferrer noopener">User Inyerface</a>&nbsp;to check how many bad patters you will spot in your tooling.</p>



<h3 class="wp-block-heading">How to fix bad UX and quality of UI of tools?</h3>



<p>When you are designing something, please think about your users. I know it firsthand. I am really bad at designing interfaces. That is why I always hire someone to do it for me. If I do not have a budget I find the most junior person from my user-base and watch them accomplish typical tasks people will do with tool. If you are creating a vulnerability scanner, watch them how they create and execute a new vulnerability scan. If you are creating ransomware protection, ask the junior end-user computing administrator to deploy your tool. Write notes. Don&#8217;t explain why UI works certain way. If you have to explain UI, your UI is probably bad. There is difference between complicated and bad, ours are mostly bad.</p>



<p>Although responses were mostly oriented towards vendors and tooling. Internal InfoSec guys have no worries, there is space for improvement for you too. Did you look at your board reports or dashboards? Have you ever thought how much technobabble are you using in your outcomes? Or do you even directly export data from SIEM and create a report for board? And do you wonder why board is ignoring you?</p>



<h3 class="wp-block-heading">Customer experience</h3>



<p>This answer came mainly from non-expert and non-security people. In general, most objections might be translated:</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow"><p>To buy security products or services I have to be a security expert first.  To hire the right security person, I have to be a security person. It does not make sense.</p></blockquote>



<p>This means we do not know our customers and we do not understand them. When I asked more I found out most products and services are perceived as a snake-oil. Our customers hate fearmongering. I do not get how can most of the security industry sell-by fear and when I ask CISO or CIO they will immediately tell me this is the thing they hate most.</p>



<p>There are not clear processes and expectations management for customers &#8211; either internal or external. In most companies security is seen as disabler and not an enabler. When wrapped up, security is providing really bad customer experience.</p>



<h3 class="wp-block-heading">How to fix a bad customer experience?</h3>



<p>Just know you have a customer and accept there are stakeholders. It might be your board, CIO, users in your organization. Design your processes and playbooks around customers, not your problems.</p>



<p>Here goes one pro-tip: if you hear complains like: “security is only bossing people around&#8221; try to help them instead of bossing them. I am not saying you are not useful, but you might not help them personally. Visit your users, discuss their issues, give insights and shift from default to no mindset.</p>



<p>If you have junior staff, you want to train in dealing with end-users create open door Friday and let know people in your company they can visit you every Friday with personal computer security issues. You will get to know each other and help them. There is a secret benefit for your organization too – every problem on user computer is sooner or later be your problem. Remember ransomware? Someone will bring it on USB stick.</p>



<p>Customer experience in the security field is a big topic and I am still researching this area. If you see yourself as a customer for security please get in touch and help me research this topic!</p>



<h3 class="wp-block-heading">Scaling</h3>



<p>Maybe your company is hiring growth hackers, development teams are closing bugs blazing fast and delivering features with speed of light. You have gone full DevOps, Agile way. Doing whatever is cool these days &#8211; be it microservices, serverless,&nbsp;<a href="https://github.com/hosuaby/no-as-a-service" target="_blank" rel="noreferrer noopener">No-as-a-service</a>.</p>



<p>What are security guys doing? If you are a security professional, did you help to scale security with the rest of the company? Integrated static and dynamic analysis into CI/CD? If you work securing industrial control systems, did you help to set up a manageable process for testing new releases of firmware? Are you ready for getting connected ICS to corporate network because digital, IIoT or whatever is fancy now? If you are developing software, do you have automated fuzzing in place? With an emphasis on scalable, automatic and predictable?</p>



<p>Fear not, it is not about people only. Our tooling does not scale too. Licensing is per application. If you deploy 1000 microservices, is it 1000 applications? Or we have one application consisting of 1000 microservices?&nbsp;Can you spin 200 instances of <g class="gr_ gr_9 gr-alert gr_spell gr_inline_cards gr_disable_anim_appear ContextualSpelling" id="9" data-gr-id="9">fuzzer</g> to test in parallel?</p>



<h3 class="wp-block-heading">How to scale security?</h3>



<p>It is simple, yet complicated. Automate. If you are doing a <g class="gr_ gr_14 gr-alert gr_spell gr_inline_cards gr_disable_anim_appear ContextualSpelling" id="14" data-gr-id="14">pentesting</g> and not utilizing a DevOps approach and, for example, deploying testing machines by hand, creating a test environment by copy-pasting commands instead of configuration management. Well, then you are doing it wrong. Security won&#8217;t be solved by putting more bodies into the security department. Firstly, there is a lack of workforce. Secondly, you do not have the budget to scale manually. And most importantly business will outgrow you to irrelevance.</p>



<p>If you are assuming, you are doing boutique-niche service like red teaming and don&#8217;t need to use the power of automation, you are still wrong. Deploy C&amp;C infrastructure automatically, when bad guys can scale by DevOps tools, you can too.</p>



<h3 class="wp-block-heading">Ignoring CI/CD pipeline</h3>



<p>This objection is more about software development and less about operations. The two biggest groups I work with are software development-based companies and industrial or utility companies. There was traditionally a big gap (and still is, but closing) between these groups in the speed of releasing. In a software development environment, releases were in days and this shifted towards hours. In an industrial environment, releases were in months and now they are in weeks.</p>



<p>If I make average from responses I can say almost 50% of our customers are releasing on a daily base, 25% on a weekly base, 10% on a monthly base. Of course, the manufacturing floor is not releasing on the same schedule like mobile app producer but still, shift towards speed is obvious.</p>



<p>However,&nbsp;<strong>these two big and distinct groups have one thing in common &#8211; security testing is done quarterly if at all.</strong></p>



<p>When I asked why development and testing are not aligned, over 90% of responses were due to a lack of resources on the security side. This seems like the same scaling problem described above right? When I looked closer on the issue I found another, different issue. It is a more philosophical issue &#8211; security sees itself as verification and wants to be the gatekeeper. DevOps or field operators in the case of ICS want to see security as an organic part of the process.</p>



<h3 class="wp-block-heading">Stop ignoring the delivery pipeline</h3>



<p>There is nothing more to say. Yes, security has a gatekeeping role but it still does not mean we are an ivory tower in the organization. We, as security professionals, want to have insight and ability to respond adequately and this is not done by gatekeeping only. We need a hands-on approach. If you are ignoring the delivery pipeline you don&#8217;t have a hands-on approach. It means you might be more burden than an asset.</p>



<h3 class="wp-block-heading">Lack of talent</h3>



<p>This was a one-voice response from CEO&#8217;s, CISO&#8217;s, HR and consulting friends. There. Are. No. People. We are spending so much money on the cafeteria system, HR, employer branding and bonuses and nothing. I did a little experiment. I downloaded job ads from the company websites of my respondents. And then I sent it to them with the question, if they know someone who fits these descriptions. Few quotations:</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow"><p>I do not know unicorns.</p></blockquote>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow"><p>Jesus died 2000 years ago.</p></blockquote>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow"><p>Sorry, I already have a job in 10 years if I will be studying for 10 hours a day.</p></blockquote>



<p>These are the three funniest responses. What was not so funny (at least for my peers, I had a good laugh) was letting them know I took job descriptions from their corporate websites.</p>



<h3 class="wp-block-heading">How to win talents?</h3>



<p>Don&#8217;t win talents. Grow people. Take a developer and train him or her for the AppSec role. Take sysadmin and teach him how to be a threat hunter. We all should stop looking for unicorns. If the military can take Average Joe and make him skilled enough to not die on the battlefield (this is your organization), be able to use weapons and operate heavy machinery (this is your tooling), we can do it too. But first, maybe stop looking for 10x engineers, create a training program and at least know whether you are looking for a generalist or specialist and team leader or individual contributor.</p>



<h3 class="wp-block-heading">Prioritization</h3>



<p>Over the last few years, I started to look at security as a subset of quality. Good product (or organization, company, whatever you are doing) must be secure to have good quality. To achieve quality, you need to have a roadmap &#8211; to know where are you going and prioritize to differentiate what is important and what can be omitted (what does not add to quality).</p>



<p>This sounds very simple and it should be project management 101, but I did not see this in almost any organization. Mostly, security was overwhelmed by repetitive tasks (see vulnerability scanning), checklists for compliance or investigating &#8220;incidents&#8221; in SIEM. I usually ask how is the security department going to look in two years, what tools and processes will be in place, about education, I either did not get any answer or super long wishlist without priorities. Both are wrong.</p>



<h3 class="wp-block-heading">How to prioritize?</h3>



<p>This is not rocket science but still, I do not see it implemented often. CSO or CISO should know the business goals of the organization they are securing. I was very surprised when CISO of the company I worked with was not informed about the acquisition and was only told they will be merging codebases to integrate products.&nbsp;</p>



<p>And at the same time, most of the product or CEO guys I asked could not tell a security roadmap for their organization. This means you are making each other job harder. Take a look from their side &#8211; they do not know your expectations. If you come with a request they will default to No.&nbsp;</p>



<p>Either, the group I asked is so advanced they could just operate and there are no fixes needed or there is a communication problem.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow"><p>Do you have a security roadmap you can share with your peers and superiors?</p></blockquote>



<h3 class="wp-block-heading">Conclusion</h3>



<p>These were six most often mentioned issues with security and helped me to see through my blind spots. I did not realize our tools are so unfriendly, our communication is unclear, we do not know how to prioritize and present priorities. That problem with people might be a problem with our unrealistic expectations. I hope my colleagues, peers, and friends will not block my number and mail. Because I am going to compile feedback we all should ask for.</p>



<p><strong>What are your thoughts? Agree or disagree?</strong></p>



<p>Jozef Mareš, founder and security expert</p>
<p>The post <a href="https://rolken.cz/6-biggest-security-painpoints/">6 biggest security pain points​</a> appeared first on <a href="https://rolken.cz">Rolken</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Red team explained</title>
		<link>https://rolken.cz/red-team-explained/</link>
		
		<dc:creator><![CDATA[root]]></dc:creator>
		<pubDate>Thu, 23 May 2019 07:40:10 +0000</pubDate>
				<category><![CDATA[Red team]]></category>
		<category><![CDATA[red team]]></category>
		<guid isPermaLink="false">https://rolken.cz/?p=2697</guid>

					<description><![CDATA[<p>It became trend last two years to ask for&#160;red team assessment instead of security assessment, pentests or application tests. Somehow a red team became a fancy word for an&#160;external penetration test with&#160;social engineering on selected targets. We, in Rolken, are firm believers that security works and it&#8217;s easy but not simple. Since there are no<a href="https://rolken.cz/red-team-explained/">[...]</a></p>
<p>The post <a href="https://rolken.cz/red-team-explained/">Red team explained</a> appeared first on <a href="https://rolken.cz">Rolken</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>It became trend last two years to ask for&nbsp;<a href="https://rolken.cz/en/how-can-we-help/red-team/">red team assessment</a> instead of security assessment, pentests or <a href="https://rolken.cz/en/how-can-we-help/application-security/">application tests</a>. Somehow a red team became a fancy word for an<a href="https://rolken.cz/en/how-can-we-help/penetration-tests/">&nbsp;external penetration test</a> with&nbsp;<a href="https://rolken.cz/en/how-can-we-help/social-engineering/">social engineering</a> on selected targets. We, in Rolken, are firm believers that security works and it&#8217;s easy but not simple. Since there are no holy-cow-silver-bullet-solutions red teaming is not an example.&nbsp;</p>
<p>There are multiple reasons why you want to use red teaming but let&#8217;s curb the first enthusiasm and set a little bit of&nbsp;the expectations:</p>
<ul class="block-editor-rich-text__editable editor-rich-text__editable" role="textbox" contenteditable="true" aria-multiline="true" data-is-placeholder-visible="false" aria-label="Write list…" aria-autocomplete="list">
<li>there is <strong>no magic going to happen</strong> &#8211; a blue team and a red team have still to work security out and it is going to take time;</li>
<li>everyone is unique and it <strong>is</strong> <strong>not sufficient reason</strong> to do red teaming <strong>just</strong> <strong>because everyone is doing it</strong>;</li>
<li><strong>the bad red team is worse than no red team</strong> &#8211; starting with red teaming is more about culture than results. The bad red team is going to move your culture at least one year back.</li>
</ul>


<h3 class="wp-block-heading">When to use red team</h3>



<p>When you have basics done. These basics are: you have staff, you are able to monitor at least the network level, and you think you can respond to incidents. This carry you did at least these things:</p>



<ol class="wp-block-list"><li>an <a href="https://rolken.cz/how-can-we-help/asset-management/">asset inventory</a> and you understand your landscape (where are devices, which firmware your switches have, how many access points you are operating, how many unsupported windows XP you have etc.);</li><li>centralized logs and network monitoring;</li><li>you did basic hygiene &#8211; regular <a href="https://rolken.cz/how-can-we-help/vulnerability-assessment/">vulnerability scanning</a> and <a href="https://rolken.cz/how-can-we-help/penetration-tests/">penetration tests</a>;</li><li>and fixed pentests and vulnerability scans outcomes and documented what could not be fixed. And you are monitoring the weak points which can&#8217;t be fixed.</li></ol>



<p>You don&#8217;t need to have fancy tools like an anomaly monitoring, SIEM, security automation etc. In our experience, the motivated team of juniors with open source tools would give us way harder time than just one person with many fancy tools.</p>



<h3 class="wp-block-heading">How to use red team</h3>



<p>There is <strong>the sole purpose of a red team &#8211; to improve a blue team</strong>. It is like vaccination &#8211; if you want your immune cells able to react properly to a real adversary, you need to expose them to one in a controlled environment. Also, practice makes perfect and worst time to practice is during the <g class="gr_ gr_8 gr-alert gr_gramm gr_inline_cards gr_disable_anim_appear Grammar only-ins replaceWithoutSep" id="8" data-gr-id="8">real</g> crisis.</p>



<p>There is another important thing to consider and it is continuity. You want <strong>continual improvement of a blue team</strong> and to achieve the <g class="gr_ gr_5 gr-alert gr_gramm gr_inline_cards gr_disable_anim_appear Grammar only-ins replaceWithoutSep" id="5" data-gr-id="5">continual</g> improvement you need to <strong>do regular exercises</strong>.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow"><p><strong>Pro-tip:<br></strong> This is how you can differentiate between <g class="gr_ gr_225 gr-alert gr_gramm gr_inline_cards gr_disable_anim_appear Grammar only-ins replaceWithoutSep" id="225" data-gr-id="225">bad</g> and good red team. For bad one an objective is to hack you all the ways up and down. Good one focuses on the tested part and on skills transfer. During retrospectives, we often find the distribution of time is 40% testing, 20% recommendations, 40% skills transfer to the blue team.</p></blockquote>



<h3 class="wp-block-heading">What does it mean to win?</h3>



<p>Our approach is &#8220;if we win, we lose&#8221;. A side note: we almost always win. The good thing is we tend to win using a different approach compared to the last engagement. Our payloads from last time did not work? Very well! Physical security caught us? Good. Immediate detection of scanning? We are very happy.</p>



<p>If our tricks from the last exercise did not work it means we did our job well and a blue team have improved. Bonus for us: we have to improve too and make another clever way to overcome a blue team countermeasure.</p>



<p>Simply put, we are iterating together to moment when we have to say, sorry there is no way how we can attack you.</p>



<h3 class="wp-block-heading">In-house vs external?</h3>



<p>Let&#8217;s speak a little bit about quality. In red teaming there is a <g class="gr_ gr_6 gr-alert gr_gramm gr_inline_cards gr_disable_anim_appear Grammar only-ins replaceWithoutSep" id="6" data-gr-id="6">correlation</g> between quantity and quality in term <strong>there is no single person red team</strong> (that is why is it called team). Red team by definition is a team consisting <g class="gr_ gr_7 gr-alert gr_gramm gr_inline_cards gr_disable_anim_appear Grammar multiReplace" id="7" data-gr-id="7">from</g> people with various skills. From <a href="https://rolken.cz/how-can-we-help/application-security/">security assessment</a> via development, <a href="https://rolken.cz/how-can-we-help/social-engineering/">social engineering</a>, physical security to business analysis.</p>



<p>This means if you do not have a budget for at least 3-4 persons there is almost no point in making an internal one. Your blue team will benefit more from less interaction with a <g class="gr_ gr_5 gr-alert gr_gramm gr_inline_cards gr_disable_anim_appear Grammar only-ins replaceWithoutSep" id="5" data-gr-id="5">good</g> external party than from more interactions with a less skilled internal team.</p>



<p>It does not mean you should not have someone responsible for interaction with a red team and organisation of red teaming activities. But it could be a manager of a blue team &#8211; in the end, it is this role which strives excellence of his team. In our experience, we delivered the best results when on the other side was a technically competent project manager. Often it is pentester or security analyst with people and project management skills.</p>



<p>Decided to go for the internal one? Try to understand who you are hiring and what they are going to do. You can start by reading <a href="https://www.amazon.com/Rtfm-Red-Team-Field-Manual/dp/1494295504/ref=sr_1_1?keywords=red+team&amp;qid=1558597020&amp;s=gateway&amp;sr=8-1">Red Team Field Manual</a> and <a href="https://www.amazon.com/Blue-Team-Field-Manual-BTFM/dp/154101636X/ref=sr_1_5?keywords=red+team&amp;qid=1558597020&amp;s=gateway&amp;sr=8-5">Blue Team Field Manual</a> because <g class="gr_ gr_5 gr-alert gr_spell gr_inline_cards gr_disable_anim_appear ContextualSpelling ins-del multiReplace" id="5" data-gr-id="5">you&#8217;v</g> got to have defenders first.</p>



<h2 class="wp-block-heading">TL; DR</h2>



<p>Red teaming is <strong>less product or service and more cultural change</strong>. To embrace this cultural change you&#8217;ve got to know when and how to do it and understand nuances and motivations (what you want to achieve and what is on the market).</p>



<p>To succeed and implement red teaming into your organisation fix basics at first (<a href="https://rolken.cz/how-can-we-help/asset-management/">assets</a>, <a href="https://rolken.cz/how-can-we-help/vulnerability-assessment/">vulnerabilities</a>, <a href="https://rolken.cz/how-can-we-help/penetration-tests/"><g class="gr_ gr_4 gr-alert gr_spell gr_inline_cards gr_disable_anim_appear ContextualSpelling" id="4" data-gr-id="4">pentests</g></a> and countermeasures), communicate with a blue team and let them know you want to transfer skills from red to blue not test and catch them with pants down. Decide on the best approach &#8211; whether you have enough resources to build internal one or you are going for the external route.</p>
<p>The post <a href="https://rolken.cz/red-team-explained/">Red team explained</a> appeared first on <a href="https://rolken.cz">Rolken</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Why is a Red team usually more successful than a Blue team?</title>
		<link>https://rolken.cz/why-is-red-team-typically-more-sucessfull-then-blue-team/</link>
		
		<dc:creator><![CDATA[root]]></dc:creator>
		<pubDate>Tue, 26 Mar 2019 10:40:21 +0000</pubDate>
				<category><![CDATA[Red team]]></category>
		<category><![CDATA[asset management]]></category>
		<category><![CDATA[blue team]]></category>
		<category><![CDATA[incident response]]></category>
		<category><![CDATA[red team]]></category>
		<guid isPermaLink="false">https://rolken.cz/?p=2486</guid>

					<description><![CDATA[<p>Over the last ten years we performed more than one hundred red team assessments and only in three cases we failed to completely obtain protected assets, information or data. In general, as the red team, we are almost always on the winning side. But why? Are we so much smarter than the blue team? Or<a href="https://rolken.cz/why-is-red-team-typically-more-sucessfull-then-blue-team/">[...]</a></p>
<p>The post <a href="https://rolken.cz/why-is-red-team-typically-more-sucessfull-then-blue-team/">Why is a Red team usually more successful than a Blue team?</a> appeared first on <a href="https://rolken.cz">Rolken</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Over the last ten years we performed more than one hundred red team assessments and only in three cases we failed to completely obtain <a href="https://rolken.cz/how-can-we-help/asset-management/">protected assets</a>, information or data.</p>



<p>In general, as the red team, we are almost always on the winning side. But why? Are we so much smarter than the blue team? Or is it because to defend is harder than to attack?</p>



<p>To answer the question, why is the red team significantly more successful, we performed a short analysis of the asses<g class="gr_ gr_4 gr-alert gr_spell gr_inline_cards gr_disable_anim_appear ContextualSpelling ins-del multiReplace gr-progress sel" id="4" data-gr-id="4">s</g>ments aimed at assessing the difficulty of obtaining protected data. Based on the analysis, we present&nbsp;<strong>three basic, continual activities of the blue team&nbsp;</strong>that significantly reduces the red team&#8217;s success.</p>



<h3 class="wp-block-heading"><strong>Time for “spring clean-up” or do you know your assets? Red team does!</strong></h3>



<p>Even thought you would like to, it’s not necessary to immediately throw away all old apps and systems on long time forgotten servers. But, do a “clean-up” in your assets inventory.  We know, setting up new <a href="https://rolken.cz/how-can-we-help/vulnerability-assessment/">vulnerability scans</a> and finding new air gap vectors is more fun. However, this attack vector is complicated.  In a real world, we are going to find an old <a href="https://rolken.cz/how-can-we-help/application-security/">web application</a> purchased by the marketing department for a campaign finished three years ago and exploit it. It is always “the low hanging fruit” first. Remember we are doing for your improvement not a conference show case.</p>



<p><a href="https://rolken.cz/how-can-we-help/asset-management/">Asset inventory</a> is the most important basic line of defence. You need to know about every item you are protecting. Therefore, we recommend to set a basic, the most important target for the Blue team, <strong>to update the <a href="https://rolken.cz/how-can-we-help/asset-management/">asset inventory</a> every week</strong>. That is all. If your are doing this continuously, the attacker will not have an easy work, because with this measure you will eliminate &#8220;the lowest hanging fruit&#8221;.</p>



<h3 class="wp-block-heading"><strong>Curiosity is good or learn to detect the anomalies!</strong></h3>



<p>What is your detection capability? Yeah, we know, you probably have IDS and IPS, firewalls, correlation engine and all those cool stuff. But do you know how usually we got backconnect from the cracked machine? Meterpreter TCP. A bit more challenging is using OpenVPN on port 443 / TCP. Sometimes it is necessary to use a <g data-gr-id="11" id="11" class="gr_ gr_11 gr-alert gr_gramm gr_disable_anim_appear Grammar only-ins replaceWithoutSep">more</g> complicated approach, let&#8217;s say like Raspberry <g data-gr-id="9" id="9" class="gr_ gr_9 gr-alert gr_spell gr_disable_anim_appear ContextualSpelling ins-del">PI</g> with LTE modem. And occasionally we use sat link (OK, full disclosure here we wanted to try it, it&#8217;s was not really needed).</p>



<p>If you have properly set up an <a href="https://rolken.cz/how-can-we-help/asset-management/">asset management</a> and detection capability, you should uncover our activities immediately (because we had to put something into your network) &#8211; so no big deal.</p>



<p>To be able to detect anomalies, we recommend to set a simple target &#8211; <strong>always know everything about <a href="https://rolken.cz/how-can-we-help/incident-management/">egress traffic</a></strong>. Egress is more important than ingress because you can detect a successful attack <g class="gr_ gr_4 gr-alert gr_spell gr_inline_cards gr_disable_anim_appear ContextualSpelling ins-del" id="4" data-gr-id="4">in</g> the egress traffic.</p>



<h3 class="wp-block-heading"><strong>Practice makes perfect or train for incident response</strong></h3>



<p>When I had a role in the purple team, I had many interviews with blue and red team members. Funny thing, how much the red team and the blue team do not know each other. The blue team expects super-elite hackers who will use the never-seen techniques and tools. The red team expects that the blue team is able to detect an <g class="gr_ gr_9 gr-alert gr_gramm gr_inline_cards gr_disable_anim_appear Grammar only-ins doubleReplace replaceWithoutSep" id="9" data-gr-id="9">attack</g> in the style of &#8220;<a href="https://www.youtube.com/watch?v=PJqbivkm0Ms">Minority Report&#8221;</a>. None of these is true.</p>



<p>Practice makes perfect. Therefore, <strong>you should do periodic<a href="https://rolken.cz/how-can-we-help/incident-management/"> incident response </a>exercises</strong>. Do you know how much harder it would be for an attacker if your operator would be work with an analyst and upon detection there would be a clear list of actions and countermeasures?</p>



<p>In conclusion, I would like to share with you this tip from Twitter account  <a href="https://twitter.com/picardtips">Picard&#8217;s management tips (by the way, a great Twitter account, try it)</a>:<br></p>



<div class="wp-block-image"><figure class="aligncenter"><img fetchpriority="high" decoding="async" width="638" height="232" src="https://rolken.cz/wp-content/uploads/Screenshot-2019-03-26-at-11.16.05.png" alt="If you know how to manage incident red team is going to have hard time." class="wp-image-2488" srcset="https://rolken.cz/wp-content/uploads/Screenshot-2019-03-26-at-11.16.05.png 638w, https://rolken.cz/wp-content/uploads/Screenshot-2019-03-26-at-11.16.05-300x109.png 300w" sizes="(max-width: 638px) 100vw, 638px" /><figcaption>Run crisis drills when all is well. A real calamity is not a good time for training. </figcaption></figure></div>



<p>What do you think? <strong>We agree with Mr. Picard!</strong></p>
<p>The post <a href="https://rolken.cz/why-is-red-team-typically-more-sucessfull-then-blue-team/">Why is a Red team usually more successful than a Blue team?</a> appeared first on <a href="https://rolken.cz">Rolken</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
