Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -62,7 +62,7 @@

## Misc

* Added Lightning Talk YouTube links for ATT&CKCon 4.0
* Added Lightning Talk YouTube links for ATT&CKcon 4.0

## Bugfixes

Expand Down
4 changes: 2 additions & 2 deletions data/attackcon.json
Original file line number Diff line number Diff line change
Expand Up @@ -318,7 +318,7 @@
"organization": "LLC"
}
],
"description": "How \"hard\" is it to do a given ATT&CK technique? Are they all the same? Clearly Phishing is a lot easier than Hardware additions for initial access. How many ATT&CK techniques can be done within a budget of say $1000? Answering these questions is a powerful step towards knowing what kinds of threats you will face. Building on the ATTCKCon 4.0 Lightning Talk \"Adjectives for ATT&CK\", this presentation continues the work of organizing offensive techniques into levels of effort. This enables better training, prediction of adversary capabilities and imposing the maximum cost on threat actors.",
"description": "How \"hard\" is it to do a given ATT&CK technique? Are they all the same? Clearly Phishing is a lot easier than Hardware additions for initial access. How many ATT&CK techniques can be done within a budget of say $1000? Answering these questions is a powerful step towards knowing what kinds of threats you will face. Building on the ATT&CKcon 4.0 Lightning Talk \"Adjectives for ATT&CK\", this presentation continues the work of organizing offensive techniques into levels of effort. This enables better training, prediction of adversary capabilities and imposing the maximum cost on threat actors.",
"video": "https://www.youtube.com/watch?v=03Ka4RM0LSM&list=PLLGRmm150VfA8ahybY6XdDGtbCkoBNyyn&index=25",
"slides": "https://www.slideshare.net/slideshow/i-ll-take-att-ck-techniques-that-can-be-done-for-1000-alex-ben-langrill/273715590"
},
Expand Down Expand Up @@ -1227,7 +1227,7 @@
"names": ["Brandon Levene"],
"organization": "Google"
}],
"description": "Opportunistically targeted ransomware deployments, aka Big Game Hunting (BGH), have caused a distinct disruption in the mechanics of monetizing crimeware compromises. This strategy has become the “end game” for the majority of organized cybercrime organizations, and one effect of this shift is the increased emphasis on enterprise-level targets. In this talk from the MITRE ATT&CKCon Power Hour session on October 9, 2020, Levene walks us through research about how a specific BGH threat actor pursues entry points, gains its foothold, pivots, and deploys payloads to maximize their financial gains with minimal effort - and infrastructure! You’ll walk away with an understanding of the latest BGH TTPs seen in enterprise environments, and how they map to the ATT&CK framework so you can build this research into your threat detection strategy and enhance your defenses.",
"description": "Opportunistically targeted ransomware deployments, aka Big Game Hunting (BGH), have caused a distinct disruption in the mechanics of monetizing crimeware compromises. This strategy has become the “end game” for the majority of organized cybercrime organizations, and one effect of this shift is the increased emphasis on enterprise-level targets. In this talk from the MITRE ATT&CKcon Power Hour session on October 9, 2020, Levene walks us through research about how a specific BGH threat actor pursues entry points, gains its foothold, pivots, and deploys payloads to maximize their financial gains with minimal effort - and infrastructure! You’ll walk away with an understanding of the latest BGH TTPs seen in enterprise environments, and how they map to the ATT&CK framework so you can build this research into your threat detection strategy and enhance your defenses.",
"video": "https://www.youtube.com/watch?v=CNTAK54JxrI&list=PLkTApXQou_8KKl3fOIPKD_9pNpmSe1TKu&index=23",
"slides": "https://www.slideshare.net/attackcon2018/ta505-a-study-of-high-end-big-game-hunting-in-2020"
},
Expand Down
2 changes: 1 addition & 1 deletion modules/resources/static_pages/attackcon.md
Original file line number Diff line number Diff line change
@@ -1,3 +1,3 @@
Title: ATT&CKCon
Title: ATT&CKcon
Template: resources/attackcon
save_as: resources/attackcon/index.html
2 changes: 1 addition & 1 deletion modules/resources/templates/attackcon-overview.html
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@ <h1>{{ con.title }}</h1>
{% set ifSponsor = "sponsors_img_list" in con %}
{% if "banner_img" in con %}
<p>
<img src="{{ con.banner_img }}" alt="ATT&CKCon Banner" {% if ifSponsor %} width="90%" {% else %} width="100%" {% endif %}>
<img src="{{ con.banner_img }}" alt="ATT&CKcon Banner" {% if ifSponsor %} width="90%" {% else %} width="100%" {% endif %}>
</p>
{% endif %}

Expand Down
4 changes: 2 additions & 2 deletions modules/resources/templates/attackcon.html
Original file line number Diff line number Diff line change
Expand Up @@ -12,12 +12,12 @@
<ol class="breadcrumb">
<li class="breadcrumb-item"><a href="/">Home</a></li>
<li class="breadcrumb-item"><a href="/resources">Resources</a></li>
<li class="breadcrumb-item">ATT&amp;CKCon</li>
<li class="breadcrumb-item">ATT&amp;CKcon</li>
</ol>

<div class="container-fluid pb-3">
<div class="working-with-attack">
<h1>ATT&amp;CKCon</h1>
<h1>ATT&amp;CKcon</h1>
<div class="my-5">
<p>
At MITRE ATT&amp;CK's annual conference, cybersecurity leaders and practitioners of all levels are
Expand Down
Loading