Adversary emulation using CALDERA Building custom plugins Part #3

  • Webcast Aired Monday, May 4, 2020 at 1:00 pm EDT (2020-05-04 17:00:00 UTC)
  • Speaker: Erik Van Buggenhout

In our final webcast in the series, we will take it a step further. While we covered development of CALDERA abilities during the previous webcast, we will develop custom plugins now. Plugins are at the core of CALDERA and can be used to further extend the engine and CALDERA's overall capabilities. We will show an example of a custom plugin that can be developed to create a custom JSON export of MITRE ATT&CK coverage. This in turn can be used to build a fully automated adversary emulation pipeline that reports on both prevention & detection coverage of MITRE ATT&CK techniques!