Thursday 20 August 2020

PurpleSharp - C# Adversary Simulation Tool That Executes Adversary Techniques With The Purpose Of Generating Attack Telemetry In Monitored Windows Environments


Defending enterprise networks against attackers continues to present a difficult challenge for blue teams. Prevention has fallen short; improving detection & response capabilities has proven to be a step in the right direction. However, without the telemetry produced by adversary behavior, building new and testing existing detection capabilities will be constrained.
PurpleSharp is an open source adversary simulation tool written in C# that executes adversary techniques within Windows Active Directory environments. The resulting telemetry can be leveraged to measure and improve the efficacy of a detection engineering program. PurpleSharp leverages the MITRE ATT&CK Framework and executes different techniques across the attack life cycle: execution, persistence, privilege escalation, credential access, lateral movement, etc. It currently supports 37 unique ATT&CK techniques.

PurpleSharp was first presented at Derbycon IX on September 2019.
An updated version was released on August 6th 2020 as part of BlackHat Arsenal 2020. If you want to jump straight to the demos:

Demo 1


Demo 2


Goals / Use Cases
The attack telemetry produced by simulating techniques with PurpleSharp aids detection teams in:
  • Building new detecttion analytics
  • Testing existing detection analytics
  • Validating detection resiliency
  • Identifying gaps in visibility
  • Identifing issues with event logging pipeline

Quick Start Guide
PurpleSharp can be built with Visual Studio Community 2019 or 2020.

Documentation
https://purplesharp.readthedocs.io/

Authors

Acknowledgments
The community is a great source of ideas and feedback. Thank you all.




via KitPloit

Related articles


  1. Hack And Tools
  2. Hacking Tools 2020
  3. Hack Tools For Ubuntu
  4. Hacker Hardware Tools
  5. Hacker Search Tools
  6. Install Pentest Tools Ubuntu
  7. Hack Tool Apk No Root
  8. Pentest Tools Windows
  9. Hacker Tools For Ios
  10. Hacker Tools List
  11. Pentest Recon Tools
  12. Hacker
  13. How To Hack
  14. Hackrf Tools
  15. Best Hacking Tools 2020
  16. Hacker Tools Hardware
  17. Hacking Tools For Pc
  18. Pentest Tools Kali Linux
  19. Black Hat Hacker Tools
  20. Pentest Tools Free
  21. Hacking Tools
  22. Wifi Hacker Tools For Windows
  23. Hacking Tools Windows 10
  24. Game Hacking
  25. Hacker Tools For Ios
  26. Free Pentest Tools For Windows
  27. Wifi Hacker Tools For Windows
  28. Github Hacking Tools
  29. Hak5 Tools
  30. Hacker Tools
  31. Hack Rom Tools
  32. What Is Hacking Tools
  33. Hacker Security Tools
  34. Hacking Apps
  35. Hacking Tools Software
  36. Hackrf Tools
  37. Hacking Tools Windows 10
  38. Pentest Tools Subdomain
  39. Pentest Tools Port Scanner
  40. Hacking Tools
  41. Pentest Tools Open Source
  42. Pentest Tools Apk
  43. Pentest Tools Android
  44. Pentest Tools List
  45. Hacker Techniques Tools And Incident Handling
  46. Pentest Tools Kali Linux
  47. Hacker Tools For Pc
  48. Tools Used For Hacking
  49. Hackers Toolbox
  50. Hack Tool Apk No Root
  51. Ethical Hacker Tools
  52. Hack Rom Tools
  53. Hacker Tools Free
  54. Pentest Tools Open Source
  55. How To Make Hacking Tools
  56. Hack Tools For Ubuntu
  57. World No 1 Hacker Software
  58. Hack Tool Apk
  59. Hack Tools
  60. Hacking Tools Kit
  61. Best Pentesting Tools 2018
  62. Pentest Tools Linux
  63. Pentest Tools For Mac
  64. Hack Tools
  65. Top Pentest Tools
  66. Hacking Tools For Kali Linux
  67. Best Hacking Tools 2019
  68. Pentest Tools Open Source
  69. Hacker Tools Online
  70. Growth Hacker Tools
  71. Hack Tools For Windows
  72. Pentest Tools Review
  73. Hack Tools For Games
  74. Hack Tools Mac
  75. Hacking Tools Windows 10
  76. Nsa Hack Tools
  77. Hacker Tools Github
  78. Hacker Tools Apk Download
  79. Hacker Tools Free
  80. New Hack Tools
  81. Hack Tools Mac
  82. Pentest Tools Framework
  83. Pentest Tools Apk
  84. Hacker Tools Linux

No comments:

Post a Comment