Skip to content

FTA hackathon March 2022 (done by Rudnei, Andre, Ricardo, Simona, Andrew and Andrej)

Notifications You must be signed in to change notification settings

rudneir2/Red_vs_Blue_in_a_box

Repository files navigation

Red vs Blue in a box

FTA hackathon March 2022 (done by Rudnei, Andre, Ricardo, Simona, Andrew and Andrej)

Intro

In the Cybersecurity area, it is very common Security professionals refer to “Red Team” and “Blue Team”, when they want to specify in each side that Team are playing. Red means “attack” and Blue means “defense”.

Red team plays in the offensive side, and they will work to try compromising their own environment with different cybersecurity tools like many available through a Kali Linux distribution.

Blue team works on the defense against Red team and they are supposed to test the effectiveness of their security solutions.

This is a great scenario for a Microsoft hackathon exercise.

As a Red team will have a Kali Linux VM as the main tool to attack. As a Blue team will have some Azure security services to protect a simple environment that contains a Web App solution and two VMs, one with Windows 10 and one with Windows Server 2019. Those are the Security service that Blue team may work with:

  • Azure Firewall
  • DDOS protection
  • Web Application Firewall
  • Log Analytics (log repository)
  • Sentinel (SIEM / SOAR)

Scenario with no Azure Security service

The diagrams below explain how we prepared the solution for the Red vs Blue scenario.

image

NOTE: The Kali Linux may be deploy in different ways, it will depend on your internal Security policies and rules. Those are some options you can consider:

  • everything on the same subscription and the same resorce group;
  • kali linux in a different resource group
  • kali linux in a different subscription
  • (this is how we did it! Kali on a private subscription and the rest of the environment on a Microsoft subscription) *

Scenario WITH Azure Security service

The second diagram below is just an example of an attacks against the Web App, however with two layers of protection, the WAF and Microsoft Sentinel.

image

More details about each type of attack (Red Team) and the Azure Security services that will provide protection to the environment (Blue Team), will be in separated articles (links below).

The Box

This entire environment may be deployed automatically through an ARM Template through this link. That is what is referred to in the title of this article as "a box", which means, everything together, in a single “box”, to make easier the deployment of the environment so that you may focus on the Security part of the exercise and play both Red and Blue team.

If you try to use a Microsoft or a MSDN Azure subscription, you will have to use this ARM Template that contains a version of Kali Linux that is allowed to be deployed on Microsoft or MSDN subscriptions.

This ARM Template will require some additional steps to make Kali Linux work properly. Those steps are part of the document in the link above.

You can also use Bicep Template for greater flexibility and option to deploy Red and Blue environments into different subscriptions. Follow this guide to deploy Red and Blue environment with Bicep templates.

Instructions to simulate and execute the Attacks and how to defend against it

After you deploy the environment through ARM Template (you can deploy manually, resource by resource as well), you will find the instructions to start the attack and, how to protect against it by using one or more Azure Security services.

  1. Web vulnerability scan (by Rudnei Oliveira) (https://github.com/rudneir2/attack-web_vulnerability_scan)
  2. Web Attack (by Andre Murrel) (https://github.com/rudneir2/WebSiteAttack-byAndreMurrel-)
  3. XSS (Cross-site scripting) link will be provided soon
  4. SQLi link will be provided soon
  5. DDOS attack and defense link will be provided soon

About

FTA hackathon March 2022 (done by Rudnei, Andre, Ricardo, Simona, Andrew and Andrej)

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 3

  •  
  •  
  •