githubEdit

Purple Team

Overview

Purple teaming combines offensive (red) and defensive (blue) team activities to improve overall security posture. This section covers detection engineering, log analysis from an attacker's perspective, and SIEM evasion techniques.

Detection Engineering Basics

Understanding Detection Logic

# Detections typically look for:
# 1. Known bad indicators (signatures)
# 2. Suspicious behavior patterns (heuristics)
# 3. Anomalies from baseline (behavioral)
# 4. Correlation of multiple events

# Common detection frameworks:
# - MITRE ATT&CK (adversary tactics/techniques)
# - Sigma (generic detection rules)
# - YARA (malware patterns)
# - Snort/Suricata (network IDS)

# Detection efficacy depends on:
# - Log coverage (what's being collected)
# - Rule quality (precision vs recall)
# - Analyst response time
# - False positive rate

Sigma Rules

YARA Rules

Log Analysis for Attackers

Windows Event Logs

Linux Logs

Network Logs

SIEM Evasion

Blending In

Log Tampering

Avoiding Detection Rules

Network Evasion

Atomic Red Team

Overview

Testing Detection Coverage

Detection Bypass Techniques

AMSI Bypass (Revisited)

ETW Bypass

Script Block Logging Bypass

Sysmon Evasion

Resources

Tools

References

Last updated

Was this helpful?