Talkin' About [Infosec] News, Powered by Black Hills Information Security

Talkin' About [Infosec] News, Powered by Black Hills Information Security


Webcast: OPSEC Fundamentals for Remote Red Teams

March 25, 2021

During remote red team exercises, it can be difficult to keep from leaking information to the target organization’s security team. Every interaction with the target’s website, every email sent, and every network service probed leaves some trace that the red team was there.

Mature blue teams can correlate those pieces of information to identify red team actions and infrastructure, and use that information to either block the red team outright or execute deception operations to frustrate further attacks.

In this Black Hills Information Security (BHIS) webcast, Michael will discuss common sources of data leakage during remote red team exercises and steps red teamers can take to eliminate or disguise the leakage outright, or to compartmentalize their actions and keep the blue team from connecting the dots.

He’ll also discuss how red teamers can see the attack from the defender’s point of view so that these concepts can be applied to new tools and technologies in the future.

Join the BHIS Community Discord: https://discord.gg/bhis​

0:00:00​ – PreShow Banter™ — It’s Not Delivery, Its Frozen

0:09:36​ – PreShow Banter™ — One Rural to Rule Them All

0:11:51​ – PreShow Banter™ — Proudly Sucking at Charity

0:13:08​ – PreShow Banter™ — SPECIAL GUEST: Rural Tech Fund

0:20:39​ – PreShow Banter™ — Meth Lab For Computers

0:25:41​ – FEATURE PRESENTATION: OPSEC Fundamentals for Remote Red Teams

0:27:00​ – WHOAMI

0:30:42​ – Why OPSEC is Important For Red Teams

0:34:01​ – Possible Countermeasures

0:36:37​ – Other Red Team Threats

0:38:06​ – Assessing Red Team Actions