{"id":1470,"date":"2021-05-26T10:50:00","date_gmt":"2021-05-26T10:50:00","guid":{"rendered":"\/cybersecurity-blog\/?p=1470"},"modified":"2024-07-24T07:23:50","modified_gmt":"2024-07-24T07:23:50","slug":"red-and-blue-teams-training","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/red-and-blue-teams-training\/","title":{"rendered":"Red Team and Blue Team Training"},"content":{"rendered":"\n<p>Modern malware actors get into the companies\u2019 networks and steal any sensitive data they need. One of the effective ways to keep the security of any organization strong and up-to-date is to rely on the exercises of both red and blue teams. Specialists need to understand the way malware actors think and know how they can act. Moreover, cybersecurity experts have to predict and prevent attacks, make enterprises safe. And the key to this is special training.&nbsp;<br><\/p>\n\n\n\n<p>Red and blue teams are a usual method to define security weaknesses. The exercises work like this: a red team tries to compromise the system, and a blue team detects and responds to the intrusion. This combined work improves any company\u2019s security. And this technique is worth a try.&nbsp;<br><\/p>\n\n\n\n<p>Let\u2019s discuss what each team is responsible for and what exercises can help them for training.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Red Team<\/strong><\/h3>\n\n\n\n<p>Security operators from a red team pretend to be hackers and try to penetrate the system. The test of security programs looks like a real attack. The exercises have a big variety of tactics, from phishing to more sophisticated ones. After this simulation, the red team gives feedback on how to improve the defense.&nbsp;<\/p>\n\n\n\n<p>The exercise usually takes a lot of preparation. The red team often doesn\u2019t know about the defense strategies. So, the main goal is to gather information about OSs, the network, and even staff and camera placements. Then according to the plan based on the collected information, specialists identify the vulnerabilities. After that comes the attack. A red team tries to get into the network and steals the sensitive data.&nbsp;<br><\/p>\n\n\n\n<p>Different techniques and tools can help operators to exploit the weak points and break into the network. They may infect hosts with malware or even bypass physical security controls.<br><\/p>\n\n\n\n<p><strong>Here are the most used types of exercises used by a red team:<\/strong><br><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Penetration testing to gain access to a system with software tools.<\/li>\n\n\n\n<li>Social engineering to make staff reveal credentials or give access to a restricted area.<\/li>\n\n\n\n<li>Phishing to send fake emails and trick employees, to make them give up passwords, or going to fake websites.<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/05\/Red-team-1024x1024.jpg\" alt=\"the most used types of exercises used by a red team\" class=\"wp-image-7800\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/05\/Red-team-1024x1024.jpg 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/05\/Red-team-300x300.jpg 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/05\/Red-team-150x150.jpg 150w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/05\/Red-team-768x768.jpg 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/05\/Red-team-1536x1536.jpg 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/05\/Red-team-70x70.jpg 70w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/05\/Red-team-370x370.jpg 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/05\/Red-team-270x270.jpg 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/05\/Red-team-740x740.jpg 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/05\/Red-team.jpg 1800w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<h3 class=\"wp-block-heading\"><strong>Blue Team<\/strong><\/h3>\n\n\n\n<p>Security professionals from a blue team protect the organization against any kind of threat. So if we consider a red team as an offense, then a blue one has a defense role.&nbsp;<\/p>\n\n\n\n<p>These operators know the security policy of the company. And their goal is to enhance the organization\u2019s protection.<\/p>\n\n\n\n<p>The blue teaming includes risk estimation, finding out what data must be safe, staff training, and others. Specialists check suspicious activity, monitor the system, analyze traffic, scan weaknesses. As a result, they have a defensive plan that helps to improve incident response.<\/p>\n\n\n\n<p><strong>Here are the most used types of exercises used by a blue team:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Security audits to avoid phishing attacks and others.<\/li>\n\n\n\n<li>Analysis to track activity and detect signatures that might indicate a breach of security.<\/li>\n\n\n\n<li>Reverse engineering.<\/li>\n\n\n\n<li>Designing risk scenarios.<\/li>\n\n\n\n<li>Installing security, IDS software, and keeping it updated.<\/li>\n\n\n\n<li>Log and memory analysis.<\/li>\n\n\n\n<li>Analyzing logs and memory to reveal an attack.<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/05\/Blue-Team-1024x1024.jpg\" alt=\"the most used types of exercises used by a blue team\" class=\"wp-image-7799\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/05\/Blue-Team-1024x1024.jpg 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/05\/Blue-Team-300x300.jpg 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/05\/Blue-Team-150x150.jpg 150w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/05\/Blue-Team-768x768.jpg 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/05\/Blue-Team-1536x1536.jpg 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/05\/Blue-Team-70x70.jpg 70w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/05\/Blue-Team-370x370.jpg 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/05\/Blue-Team-270x270.jpg 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/05\/Blue-Team-740x740.jpg 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/05\/Blue-Team.jpg 1800w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<h3 class=\"wp-block-heading\"><strong>Training of teams&nbsp;<\/strong><\/h3>\n\n\n\n<p>Training should be a necessary step in a company\u2019s security strategy. Learning different tactics from an attacker and defender side may give you efficient protection. Adversarial and defensive methods build a strong safety program.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/05\/Using-ANYRUN-1024x1024.jpg\" alt=\"Training of teams\u00a0with ANY.RUN\" class=\"wp-image-7802\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/05\/Using-ANYRUN-1024x1024.jpg 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/05\/Using-ANYRUN-300x300.jpg 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/05\/Using-ANYRUN-150x150.jpg 150w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/05\/Using-ANYRUN-768x768.jpg 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/05\/Using-ANYRUN-1536x1536.jpg 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/05\/Using-ANYRUN-70x70.jpg 70w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/05\/Using-ANYRUN-370x370.jpg 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/05\/Using-ANYRUN-270x270.jpg 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/05\/Using-ANYRUN-740x740.jpg 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/05\/Using-ANYRUN.jpg 1800w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<p>Today we&#8217;ll give you an example of how you can have a red and blue team training with <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=in_house&amp;utm_content=red_blue\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a>.&nbsp;<br><\/p>\n\n\n\n<p><strong>Red team exercise&nbsp;<\/strong><\/p>\n\n\n\n<p>Here is <a href=\"https:\/\/app.any.run\/tasks\/0fc89385-2c08-4929-a7d5-0648ae6856fc\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">the example for red team specialists.&nbsp;<\/a><br><\/p>\n\n\n\n<p>This task can be an example of how you can trace the blue team\u2019s steps while analyzing a threat. First of all, the file of the letter downloads, then the archive in it opens. After that, the exe file launches and it turns out to be malicious. You can also try other OS versions to investigate whether it works the same way there.<br><\/p>\n\n\n\n<p>One way to improve a red teamer\u2019s skills is to understand how the set of their actions will work out on different systems. Moreover, they can investigate what step can cause challenges.&nbsp; For example, if the mentioned task had a Word document instead of the exe, a specialist would need to click and enable macros.&nbsp;<br><\/p>\n\n\n\n<p>ANY.RUN also serves as a preparation tool as the red team can step in a user\u2019s shoes and predict the possible actions.&nbsp;<br><\/p>\n\n\n\n<p>The platform can be a part of a blue training, too. Let\u2019s have a look at what task can be useful here.<br><\/p>\n\n\n\n<p><strong>Blue team exercise&nbsp;<\/strong><br><\/p>\n\n\n\n<p>The blue team has a wide range of scenarios where ANY.RUN can be used in. Including detection, threat analysis, monitoring how samples execute, and others. But today we\u2019d like to investigate one more example that is suitable for a blue team.&nbsp;<br><\/p>\n\n\n\n<p>You can take a look at how different malware samples and campaigns affect OS and what artifacts they leave. Also, you can test adversary simulation tools such as the APT simulator. Just run tools with desired parameters on different systems and research how those actions affect them. If tools created some output files, you may download them from the task. Such activities inside working virtual machines allow us to see actions made by systems and tools in real-time and analyze them in detail later.<br><\/p>\n\n\n\n<p>To expand the abilities of network analysis just download the PCAP file from your task and take a deeper look at captured traffic in tools such as Wireshark. It&#8217;s also possible to download SSLkey from the task so SSL\/TLS traffic can be decrypted in third-party tools. Check out <a href=\"https:\/\/app.any.run\/tasks\/cca456e3-d73b-42d6-aebb-04f33e6a5a56\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">the sample for a blue team<\/a> for the training.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Red and Blue team cooperation&nbsp;<\/strong><\/h3>\n\n\n\n<p>Communication between the two teams is the essential point in team exercises.<\/p>\n\n\n\n<p>The blue team should know new methods for improving security and share the results with the red team. The red team should always be aware of new threats and penetration techniques used by hackers and advise the blue team on prevention techniques.<\/p>\n\n\n\n<p>When the simulation is over both teams collect the results and report on them. The red team advises the blue one on how to prevent and stop similar attacks. The blue team in its turn should let the red one know if they identified the attempted break-in.&nbsp;<\/p>\n\n\n\n<p>That\u2019s why the idea of a purple team has appeared. Its goal is to unite red and blue teams and make them work as one team to share results.&nbsp;&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Conclusion<\/strong><\/h3>\n\n\n\n<p>The red versus blue team, a concept that is always argued about. There is a perception among cybersecurity specialists that these techniques can exist only separately. However, the best results can work out only from the joint work, like purple teaming.&nbsp;<\/p>\n\n\n\n<p>Companies need to encourage this cooperation: plan, develop, and implement stronger security controls together. As it is the only way to improve security.<\/p>\n\n\n\n<p>This approach to security is very effective. Especially when it is performed once a year, or when there are some major changes in the company. Used in combination with security audits, staff education, and tools like <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=in_house&amp;utm_content=red_blue\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"ANY.RUN (opens in a new tab)\">ANY.RUN<\/a>, you can be sure that all weak points will be eliminated and your security is strong.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Modern malware actors get into the companies\u2019 networks and steal any sensitive data they need. One of the effective ways to keep the security of any organization strong and up-to-date is to rely on the exercises of both red and blue teams. Specialists need to understand the way malware actors think and know how they [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":3773,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,8],"tags":[34],"class_list":["post-1470","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-training","category-malware-analysis","tag-malware-analysis"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Red Team and Blue Team Training - ANY.RUN&#039;s Cybersecurity Blog<\/title>\n<meta name=\"description\" content=\"Red and blue teaming is an exercise to improve cybersecurity of any organization. This technique helps to find vulnerabilities, make the defense stronger.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/red-and-blue-teams-training\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/red-and-blue-teams-training\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/red-and-blue-teams-training\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"Red Team and Blue Team Training\",\"datePublished\":\"2021-05-26T10:50:00+00:00\",\"dateModified\":\"2024-07-24T07:23:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/red-and-blue-teams-training\/\"},\"wordCount\":1220,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"malware analysis\"],\"articleSection\":[\"Analyst Training\",\"Malware Analysis\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/red-and-blue-teams-training\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/red-and-blue-teams-training\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/red-and-blue-teams-training\/\",\"name\":\"Red Team and Blue Team Training - ANY.RUN&#039;s Cybersecurity Blog\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2021-05-26T10:50:00+00:00\",\"dateModified\":\"2024-07-24T07:23:50+00:00\",\"description\":\"Red and blue teaming is an exercise to improve cybersecurity of any organization. This technique helps to find vulnerabilities, make the defense stronger.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/red-and-blue-teams-training\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/red-and-blue-teams-training\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/red-and-blue-teams-training\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Malware Analysis\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/malware-analysis\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Red Team and Blue Team Training\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Red Team and Blue Team Training - ANY.RUN&#039;s Cybersecurity Blog","description":"Red and blue teaming is an exercise to improve cybersecurity of any organization. This technique helps to find vulnerabilities, make the defense stronger.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/red-and-blue-teams-training\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/red-and-blue-teams-training\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/red-and-blue-teams-training\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"Red Team and Blue Team Training","datePublished":"2021-05-26T10:50:00+00:00","dateModified":"2024-07-24T07:23:50+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/red-and-blue-teams-training\/"},"wordCount":1220,"commentCount":1,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["malware analysis"],"articleSection":["Analyst Training","Malware Analysis"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/red-and-blue-teams-training\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/red-and-blue-teams-training\/","url":"https:\/\/any.run\/cybersecurity-blog\/red-and-blue-teams-training\/","name":"Red Team and Blue Team Training - ANY.RUN&#039;s Cybersecurity Blog","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2021-05-26T10:50:00+00:00","dateModified":"2024-07-24T07:23:50+00:00","description":"Red and blue teaming is an exercise to improve cybersecurity of any organization. This technique helps to find vulnerabilities, make the defense stronger.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/red-and-blue-teams-training\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/red-and-blue-teams-training\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/red-and-blue-teams-training\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Malware Analysis","item":"https:\/\/any.run\/cybersecurity-blog\/category\/malware-analysis\/"},{"@type":"ListItem","position":3,"name":"Red Team and Blue Team Training"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/1470"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=1470"}],"version-history":[{"count":4,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/1470\/revisions"}],"predecessor-version":[{"id":8285,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/1470\/revisions\/8285"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/3773"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=1470"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=1470"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=1470"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}