Threat Emulation Explained | Understanding Hacker’s Mentality | TryHackMe Intro to Threat Emulation

Motasem Hamdan
3 min read2 days ago

--

We covered the concept of threat emulation, the difference between threat emulation, threat simulation and penetration testing in addition to discussing the steps and frameworks such as MITRE ATT&CK and TIBER-EU used to guide the process of threat emulation. Lastly, we solved the practical challenge in TryHackMe Intro to Threat Emulation room which is part of SOC Level 2 track.

What is Threat Emulation

Threat emulation is meant to assist security teams and organisations, in general, in better understanding their security posture and their defence mechanisms and performing due diligence in their compliance. This ensures they are provided with an adversary’s perspective of an attack without the hassle of dealing with an actual threat with malicious intent. Additionally, the organisation will be well prepared if a real-time and sophisticated attack is initiated against them.

Threat Emulation vs Threat Simulation

Threat emulation is an intelligence-driven impersonation of real-world attack scenarios and TTPs in a controlled environment to test, assess and improve an organisation’s security defences and response capabilities. This means that you seek to behave as the adversary would. Threat emulation aims to identify and mitigate security gaps before attackers exploit them.

Emulation can be conducted as a blind operation — mainly as a Red Team engagement and unannounced to the rest of the defensive security team — or as a non-blind operation involving all security teams and ensuring knowledge sharing.

In contrast, threat simulation commonly represents adversary functions or behaviour through predefined and automated attack patterns that pretend to represent an adversary. This implies that the actions taken during the exercise will combine TTPs from one or more groups but not an exact imitation of a particular adversary.

Threat Emulation Methodologies

MITRE ATT&CK

The MITRE ATT&CK Framework is an industry-known knowledge base that provides information about known adversarial TTPs observed in actual attacks and breaches. Threat emulation teams can extract many benefits from integrating ATT&CK with their engagements as it would make it efficient when writing reports and mitigations related to the behaviours experimented with.

Atomic Testing

The Atomic Red Team is a library of emulation tests developed and curated by Red Canary that can be executed to test security defences within an organisation. The testing framework provides a mechanism for learning what malicious activities look like and provide telemetry from every test to facilitate defence improvements.

TIBER-EU Framework

The Threat Intelligence-based Ethical Red Teaming (TIBER-EU) is the European framework developed to deliver controlled, bespoke, intelligence-led emulation testing on entities and organisations’ critical live production systems. It is meant to provide a guideline for stakeholders to test and improve cyber resilience through controlled adversary actions.

CTID Adversary Emulation Library

The Center for Threat-Informed Defense is a non-profit research and development organisation operated by MITRE Engenuity. Its mission is to promote the practice of threat-informed defence. With this mission, they have curated an open-source adversary emulation plan library, allowing organisations to use the plans to evaluate their capabilities against real-world threats.

Threat Emulation Steps

  • Define Objectives
  • Research Adversary TTPs
  • Planning the Threat Emulation Engagement
  • Conducting the Emulation
  • Concluding and Reporting

Check out the video below for detailed explanation.

Room Answers | TryHackMe Intro to Threat Emulation

Room answers can be found here.

Video Walkthrough | TryHackMe Intro to Threat Emulation

--

--

Motasem Hamdan

Motasem Hamdan is a cybersecurity consultant and content creator. He is also a marketing expert and growth hacker. https://www.youtube.com/@MotasemHamdan