In this paper we propose a novel way of deploying vulnerable architectures for defense and research purposes, which aims to generate deception platforms based on the formal description of a scenario. An attack scenario is described by an attack graph in which transitions are labeled by ATT&CK techniques or procedures. The state of the attacker is modeled as a set of secrets he acquires and a set of nodes he controls. Descriptions of a single scenario on a technical level can then be declined into several different scenarios on a procedural level, and each of these scenarios can be deployed into its own vulnerable architecture. To achieve this goal we introduce the notion of architecture constraints, as some procedures may only be exploited on system presenting special properties, such as having a specific operating system version. Finally, we present our deployment process for converting one of these scenarios into a vulnerable infrastructure, and offer an online proof of concept demonstration of our tool, where readers may deploy locally deploy a complete scenario inspired by the threat actor APT-29.
翻译:在本文中,我们提出一种部署易受攻击架构以进行防御和研究的新方法,旨在基于场景的正式描述生成欺骗平台。攻击场景由攻击图描述,其中过渡被标记为ATT&CK技术或过程。攻击者的状态被建模为他获得的一组秘密和他控制的一组节点。同一情景的技术级别描述可以分别转化为多个过程级别的情景,并且每个情景可以部署到其自己的易受攻击的架构中。为了实现这一目标,我们引入框架约束的概念,因为某些过程只能在呈现特定属性的系统上利用,例如具有特定操作系统版本的系统。最后,我们呈现了将这些情景之一转化为易受攻击的基础设施的部署过程,并提供了我们的工具的在线演示,读者可以在本地部署一个受APT-29威胁行动启发的完整情景。