<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>asset management Archivy - Rolken</title>
	<atom:link href="https://rolken.cz/tag/asset-management/feed/" rel="self" type="application/rss+xml" />
	<link>https://rolken.cz/tag/asset-management/</link>
	<description>Cybersecurity company</description>
	<lastBuildDate>Wed, 31 Jul 2019 13:16:07 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://rolken.cz/wp-content/uploads/2018/04/cropped-logo-3-1-32x32.png</url>
	<title>asset management Archivy - Rolken</title>
	<link>https://rolken.cz/tag/asset-management/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Why is a Red team usually more successful than a Blue team?</title>
		<link>https://rolken.cz/why-is-red-team-typically-more-sucessfull-then-blue-team/</link>
		
		<dc:creator><![CDATA[root]]></dc:creator>
		<pubDate>Tue, 26 Mar 2019 10:40:21 +0000</pubDate>
				<category><![CDATA[Red team]]></category>
		<category><![CDATA[asset management]]></category>
		<category><![CDATA[blue team]]></category>
		<category><![CDATA[incident response]]></category>
		<category><![CDATA[red team]]></category>
		<guid isPermaLink="false">https://rolken.cz/?p=2486</guid>

					<description><![CDATA[<p>Over the last ten years we performed more than one hundred red team assessments and only in three cases we failed to completely obtain protected assets, information or data. In general, as the red team, we are almost always on the winning side. But why? Are we so much smarter than the blue team? Or<a href="https://rolken.cz/why-is-red-team-typically-more-sucessfull-then-blue-team/">[...]</a></p>
<p>The post <a href="https://rolken.cz/why-is-red-team-typically-more-sucessfull-then-blue-team/">Why is a Red team usually more successful than a Blue team?</a> appeared first on <a href="https://rolken.cz">Rolken</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Over the last ten years we performed more than one hundred red team assessments and only in three cases we failed to completely obtain <a href="https://rolken.cz/how-can-we-help/asset-management/">protected assets</a>, information or data.</p>



<p>In general, as the red team, we are almost always on the winning side. But why? Are we so much smarter than the blue team? Or is it because to defend is harder than to attack?</p>



<p>To answer the question, why is the red team significantly more successful, we performed a short analysis of the asses<g class="gr_ gr_4 gr-alert gr_spell gr_inline_cards gr_disable_anim_appear ContextualSpelling ins-del multiReplace gr-progress sel" id="4" data-gr-id="4">s</g>ments aimed at assessing the difficulty of obtaining protected data. Based on the analysis, we present&nbsp;<strong>three basic, continual activities of the blue team&nbsp;</strong>that significantly reduces the red team&#8217;s success.</p>



<h3 class="wp-block-heading"><strong>Time for “spring clean-up” or do you know your assets? Red team does!</strong></h3>



<p>Even thought you would like to, it’s not necessary to immediately throw away all old apps and systems on long time forgotten servers. But, do a “clean-up” in your assets inventory.  We know, setting up new <a href="https://rolken.cz/how-can-we-help/vulnerability-assessment/">vulnerability scans</a> and finding new air gap vectors is more fun. However, this attack vector is complicated.  In a real world, we are going to find an old <a href="https://rolken.cz/how-can-we-help/application-security/">web application</a> purchased by the marketing department for a campaign finished three years ago and exploit it. It is always “the low hanging fruit” first. Remember we are doing for your improvement not a conference show case.</p>



<p><a href="https://rolken.cz/how-can-we-help/asset-management/">Asset inventory</a> is the most important basic line of defence. You need to know about every item you are protecting. Therefore, we recommend to set a basic, the most important target for the Blue team, <strong>to update the <a href="https://rolken.cz/how-can-we-help/asset-management/">asset inventory</a> every week</strong>. That is all. If your are doing this continuously, the attacker will not have an easy work, because with this measure you will eliminate &#8220;the lowest hanging fruit&#8221;.</p>



<h3 class="wp-block-heading"><strong>Curiosity is good or learn to detect the anomalies!</strong></h3>



<p>What is your detection capability? Yeah, we know, you probably have IDS and IPS, firewalls, correlation engine and all those cool stuff. But do you know how usually we got backconnect from the cracked machine? Meterpreter TCP. A bit more challenging is using OpenVPN on port 443 / TCP. Sometimes it is necessary to use a <g data-gr-id="11" id="11" class="gr_ gr_11 gr-alert gr_gramm gr_disable_anim_appear Grammar only-ins replaceWithoutSep">more</g> complicated approach, let&#8217;s say like Raspberry <g data-gr-id="9" id="9" class="gr_ gr_9 gr-alert gr_spell gr_disable_anim_appear ContextualSpelling ins-del">PI</g> with LTE modem. And occasionally we use sat link (OK, full disclosure here we wanted to try it, it&#8217;s was not really needed).</p>



<p>If you have properly set up an <a href="https://rolken.cz/how-can-we-help/asset-management/">asset management</a> and detection capability, you should uncover our activities immediately (because we had to put something into your network) &#8211; so no big deal.</p>



<p>To be able to detect anomalies, we recommend to set a simple target &#8211; <strong>always know everything about <a href="https://rolken.cz/how-can-we-help/incident-management/">egress traffic</a></strong>. Egress is more important than ingress because you can detect a successful attack <g class="gr_ gr_4 gr-alert gr_spell gr_inline_cards gr_disable_anim_appear ContextualSpelling ins-del" id="4" data-gr-id="4">in</g> the egress traffic.</p>



<h3 class="wp-block-heading"><strong>Practice makes perfect or train for incident response</strong></h3>



<p>When I had a role in the purple team, I had many interviews with blue and red team members. Funny thing, how much the red team and the blue team do not know each other. The blue team expects super-elite hackers who will use the never-seen techniques and tools. The red team expects that the blue team is able to detect an <g class="gr_ gr_9 gr-alert gr_gramm gr_inline_cards gr_disable_anim_appear Grammar only-ins doubleReplace replaceWithoutSep" id="9" data-gr-id="9">attack</g> in the style of &#8220;<a href="https://www.youtube.com/watch?v=PJqbivkm0Ms">Minority Report&#8221;</a>. None of these is true.</p>



<p>Practice makes perfect. Therefore, <strong>you should do periodic<a href="https://rolken.cz/how-can-we-help/incident-management/"> incident response </a>exercises</strong>. Do you know how much harder it would be for an attacker if your operator would be work with an analyst and upon detection there would be a clear list of actions and countermeasures?</p>



<p>In conclusion, I would like to share with you this tip from Twitter account  <a href="https://twitter.com/picardtips">Picard&#8217;s management tips (by the way, a great Twitter account, try it)</a>:<br></p>



<div class="wp-block-image"><figure class="aligncenter"><img fetchpriority="high" decoding="async" width="638" height="232" src="https://rolken.cz/wp-content/uploads/Screenshot-2019-03-26-at-11.16.05.png" alt="If you know how to manage incident red team is going to have hard time." class="wp-image-2488" srcset="https://rolken.cz/wp-content/uploads/Screenshot-2019-03-26-at-11.16.05.png 638w, https://rolken.cz/wp-content/uploads/Screenshot-2019-03-26-at-11.16.05-300x109.png 300w" sizes="(max-width: 638px) 100vw, 638px" /><figcaption>Run crisis drills when all is well. A real calamity is not a good time for training. </figcaption></figure></div>



<p>What do you think? <strong>We agree with Mr. Picard!</strong></p>
<p>The post <a href="https://rolken.cz/why-is-red-team-typically-more-sucessfull-then-blue-team/">Why is a Red team usually more successful than a Blue team?</a> appeared first on <a href="https://rolken.cz">Rolken</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
