ATT 101: Caldera Operation (15 pts)

Purpose

Caldera performs APT attacks, emulating the actions of real threat actors, using the ATT&CK matrix.

In this project, you use Caldera to spy on a Windows system.

What You Need

Initial Setup

You should have a Caldera server with a connected agent on a Windows target, as shown below.

In the Caldera web console, click Campaigns, Agents.

You should see your Windows machine with a green pid number, as shown below.

Putting Loot on the Target System

On your Windows target system, install Google Chrome

Save a bookmark in Google Chrome for samsclass.info as shown below.

On your Windows target system, in Chrome, go to http://www.clamwin.com as shown below.

On the left side, click Download.

Install Clamwin with the default options. It will try to update its virus definitions, as shown below. Click the Stop button. Click the Finish button.

On your Windows target system, open Notepad and type:

TOP SECRET INFORMATION
Highlight the text and copy it to the Clipboard.

Leave Notepad open on your desktop, as shown below.

Viewing Adversary Profiles

In the Caldera web console, click Campaigns, Adversaries.

On the left side, select a profile of "Super Spy" as shown below.

On the right side, you see the many tactics this adversary will perform.

Creating an Operation

In the Caldera web console, click Campaigns, operations.

On the left side, at the top, click the VIEW slide so it changes to ADD.

Make these entries, as shown below.

Leave the other settings at their default values.

Click the green Start button.

The operation runs, as shown below.

Gold stars means information was learned.

Viewing the Screenshot

In the "Screen Capture" line, click the gold star.

The details of the attack appear. Notice where it put the screenshot, highlighted in the image below: the user's desktop.

Look on your Windows desktop. The screenshot is there, as shown below.

Flag ATT 101.1: Clipboard (15 pts)

In the Caldera web console, in the "Copy Clipboard" line, click the gold star.

The details of the attack appear. The flag is covered by a green rectangle in the image below.

References

How to Install Python 3.6.4 on Debian 9
INSTALL/SETUP MITRE CALDERA THE AUTOMATED CYBER ADVERSARY EMULATION SYSTEM
Adversary Emulation using CALDERA (slides)

Posted 5-15-2020 by Sam Bowne