Goals / What to expect
The goal of this product is to show and describe in detail chunks of different offensive executions we can usually find during real attack campaigns. There are a few main ideas and goals behind the course:
Teach you what offensive techniques exist in Linux, with mapping to the Linux Matrix
Deliver you a ready-to-copy-and-paste block of code that you can use during your own penetration testing/emulation engagements, red teaming, detection coverage testing, or EDR evaluations, with the possibility of chaining and creating advanced Linux custom attack paths
Provide you with step-by-step, hands-on instructions about the full Linux Kill Chain vs Detection
Teach you how to handle true hands-on evaluation testing of modern Linux EDR
Explain by offense what you should expect from modern Linux EDR products, with a focus on the internals, capabilities, detection, and operational efficiency
Power up your Breach and Attack Simulation Platforms (BAS)
Show you how to evaluate your Linux security tool's effectiveness across the attack lifecycle
Develop a more effective and scalable strategy to secure your organization
By using EDRmetry Matrix, you'll examine and learn how to execute custom Linux EDR attack tests mapped to MITRE ATT&CK Framework as evaluation checks. Thanks to the generic approach, you will be able to run your tests against whatever EDR you have/want to have in your production/testing/Cyber Range environment.
This practical approach will equip you with the skills to enhance your organization's defense against Linux advanced persistent threats.