Adversary Emulation
I have experience in adversarial emulation, using published research to re-create the typical infection chain of high-profile threat actors such as lockbit and black cat ransomware.
I emulated, threat actors to test security controls and validate existing detections and tooling.
Pracitcal Examples
I was the primary red team asset in an adversarial emulation project for a large financial entity. I emulated the common tactics techiques and procudres used by the specified threat actor to penetrate networks, escalate privileges and infect organizations. This was done to validate existing security controls against real-world attacks. After my assessment I would share the results with security engineers and other blue team personel to fill security gaps and fix misconfigurations.
Tools and Platforms
- SMB pentesting
- Windows privilege escalation
- Active Directory authentication attacks
- Phishing
- Living off the land binaries and scripts
- Many, many more.