Purple Team
Overview
Detection Engineering Basics
Understanding Detection Logic
# Detections typically look for:
# 1. Known bad indicators (signatures)
# 2. Suspicious behavior patterns (heuristics)
# 3. Anomalies from baseline (behavioral)
# 4. Correlation of multiple events
# Common detection frameworks:
# - MITRE ATT&CK (adversary tactics/techniques)
# - Sigma (generic detection rules)
# - YARA (malware patterns)
# - Snort/Suricata (network IDS)
# Detection efficacy depends on:
# - Log coverage (what's being collected)
# - Rule quality (precision vs recall)
# - Analyst response time
# - False positive rateSigma Rules
YARA Rules
Log Analysis for Attackers
Windows Event Logs
Linux Logs
Network Logs
SIEM Evasion
Blending In
Log Tampering
Avoiding Detection Rules
Network Evasion
Atomic Red Team
Overview
Testing Detection Coverage
Detection Bypass Techniques
AMSI Bypass (Revisited)
ETW Bypass
Script Block Logging Bypass
Sysmon Evasion
Resources
Tools
References
Last updated
Was this helpful?