General Course Flow Design
To efficiently use this content, we created a proposed generic flow consisting of six simple steps:
1. Get access to your private TARGET_X, KALI_X, and C2_X VMs.
2. Install EDR/Runtime Security/DFIR tooling @ TARGET_X:
-
Choose and install the Linux EDR/Runtime Security/DFIR engine you want to evaluate. Within
TARGET_Xin PurpleLabs Cyber Range, we support by default:Falco Runtime Security
Kunai Runtime Security
Tetragon Runtime Security
Elastic Security
Splunk SIEM
Linux IR scripts
Wazuh
OSquery + osquery-defense-kit
UAC
Velociraptor IR
bpftrace
ghostscan
Step-by-step instructions showing how to install individual agents are available in the section:
Dedicated instructions per tool can also be found in the "Defensive/DFIR Tooling" section.
3. Search Technique:
Identify relevant techniques from a comprehensive EDRmetry Matrix database.
4. Choose offensive commands:
Extract the necessary commands or code snippets and follow step-by-step instructions.
5. Execute attack emulations:
Prepare attack chains or manually execute single offensive tests on a vulnerable-by-design
TARGET_XLinux system.
6. Verify detections and alerts:
Check detections, telemetry, and alerts generated within the chosen EDR/Runtime/SIEM platform. You can challenge yourself by searching for detections/artifacts, or you can easily use the provided DETECTION/DFIR PHASE instructions
7. Dig deeper:
Make configuration changes to your EDR/Runtime/DFIR or ask the EDR/SIEM vendor questions.
Customize offensive steps, make changes to the code, and develop potential bypasses eventually
Customize defensive/forensics steps and search for new detection logics
Do additional research from the perspective of the red and blue teams
Create complex attack paths