kc7 icon indicating copy to clipboard operation
kc7 copied to clipboard

A cybersecurity game in Azure Data Explorer

Results 5 kc7 issues
Sort by recently updated
recently updated
newest added

Rather than being an arbitrary hodgepodge of key values pairs, the actor configs should be modeled after the Mitre Att&ck framework. Primarily, the outer keys should correspond to the categories...

In the actor config, the game designer should be able to provide a set of IPs specifically to be used for Authentication or Inbound browsing.

In the configs, we define several "attack types" that are used in the game These "attacks" define the first actions taken by adversaries that kick off a long chain of...

Instead of hardcoding the exfil, ransomware note, etc. in the malware or threat actor configs, create an "end state" trigger to have occur. For example after TA & Malware go...