The Cyber Threat Perspective

Episode 75: Assume Breach - Extracting Maximum Value From Offensive Security Testing

Jan 17, 2024
The discussion delves into the concept of 'Assume Breach', advocating for a proactive security mindset that identifies overlooked vulnerabilities. Real-world case studies illustrate how offensive security testing can emulate actual attacker behavior, emphasizing the importance of continuous learning. Key topics include the dangers of overreliance on tools and the significance of effective security monitoring. Attendees learn how to identify misconfigurations in systems and the value of focused testing strategies to bolster security posture against real threats.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
INSIGHT

Scanners Miss The Vulnerabilities That Matter

  • Vulnerability scanners miss critical, high-impact issues that matter to attackers.
  • Assume Breach targets those unknowns by focusing on exploitable impact rather than coverage.
INSIGHT

Coverage Versus Impact

  • Traditional internal pen tests emphasize broad coverage over real-world exploitability.
  • Assume Breach flips that by prioritizing impact and realistic attacker goals instead of raw counts.
ADVICE

Begin Tests From A Domain-Joined User

  • Start internal tests from a regular domain-joined user endpoint to mirror real attacks.
  • Use that foothold to evaluate endpoint hardening, lateral movement paths, and privilege escalation risk.
Get the Snipd Podcast app to discover more snips from this episode
Get the app