-
Notifications
You must be signed in to change notification settings - Fork 2.8k
FAQs
Answers to some common questions about Atomic Red Team.
Atomic Red Team is a library of simple tests that every security team can execute to test their controls. Tests are focused, have few dependencies, and are defined in a structured format that can be used by automation frameworks.
Atomic Red Team serves many needs: validating visibility, testing detection coverage, and emulating adversary behaviors. However, it’s increasingly clear that while the platform was designed with the intention of helping security teams execute simple red team exercises (as the name implies), it may be just as useful as an educational resource. Check out this blog post to see how it can help you gain development experience, become familiar with tools and tech, hone your analytical skill set, and even network with other security professionals.
We can visualize how well Atomic Red Team covers the MITRE ATT&CK tactics, techniques, and procedures by viewing the available atomic tests on the MITRE ATT&CK Navigator. The colored items on the matrix indicate that at least one atomic test exists for the given technique.
Check out the getting started page of the Wiki.
Yes.
You can find a listing of Linux tests here and macOS tests here.
For some history on how this project began, see the "Looking Back" blog post.
Red Canary provides managed detection and response, open-source tools, and education for the information security community.
No.
It is possible, if not probable, that antivirus vendors could use the Atomic Red
Team project to build weak detections, giving an impression of better attack
coverage than they really have. An example of a weak detection is alerting
on any file executed out of the default installation directory of
C:\AtomicRedTeam
or downloaded from the Atomic Red Team repository. The
primary suggestion for dealing with this is to use input arguments
when defining atomic tests. This allows the user to specify a custom URL to
download files from or otherwise change up the known Atomic Red team signature
at runtime in an unpredictable way.
No.
There will always be things that red teams can do that can't be scripted. For example, realistic phishing emails from a believable source, vishing, credential stuffing, zero-day exploitation, and so on.
Yes.
You can manually chain tests together by running individual atomic tests back to back but there is no automated solution for emulating a specific attack group as a whole. But stayed tuned, this feature has been requested and is in the works.
Yes.
Take a look at the Remote test execution section of the Invoke-AtomicRedTeam Wiki.
Yes.
The Atomic Red Team Slack Workspace has a public channel called "#atomic-git" where notifications for all contributions are posted.
Yes!
Look for tests which have a iaas
as a supported platform.
Questions? Get connected to the community on the Atomic Red Team™ Slack channel.