Photo by Jeferson Argueta on Unsplash

Photo by Jeferson Argueta on Unsplash

Emulate Attacks with MITRE Caldera

Volcanic

Article from ADMIN 92/2026
By
Organizations often lack the human and financial resources for red and blue teaming, forcing many admins to become both the attacker and the defender. The MITRE Caldera cybersecurity platform supports attack emulation and automates security testing.

Cybersecurity is not a one-time investment, but an ongoing budget item. Attackers are constantly improving their tools, techniques, and methods, which means defenders also need to up their detection and response game and improve security checks. If you perform manual attack analysis and emulation, you will realize how expensive, time-consuming, and difficult to repeat this work can be.

Other articles have covered tools and knowledge databases from US-based research institution MITRE. With Caldera [1], the organization now promotes a tool that helps you automatically replicate attacker behavior, allowing you to simulate complex attack chains without the need for a red team on site. You execute the same playbook of an attack pattern repeatedly to adjust your defenses in real time and validate their effectiveness.

ATT&CK Framework Basis

Caldera is available as a free open source platform and enables attacker emulation exercises with the MITRE ATT&CK framework [2]. The platform is a plugin-based framework in which modular attack steps, known as "abilities," are grouped into sequences or "adversaries" that are then executed by agents on the target computers. The agents are cross-platform capable and can be used on Windows, Linux, and macOS.

Instead of targeting exploits or vulnerabilities like other tools, Caldera targets the behavior of an attacker by simulating techniques that attackers use after a compromise, such as privilege escalation, lateral movement, or the exfiltration of company data. Its modularity and automation will help you hone your skills and adapt them to the existing IT infrastructure.

Setting Up Caldera

To get a feel for how you can use Caldera productively, I'll

...
Use Express-Checkout link below to read the full article (PDF).

Buy this article as PDF

Download Article PDF now with Express Checkout
Price $2.95
(incl. VAT)

Buy ADMIN Magazine

Related content

  • News for Admins
    In the news: Red Hat Announces Ansible Lightspeed with IBM watsonx Code Assistant; Dell APEX Cloud Platform for Red Hat OpenShift Announced; NSA Offers Best Practices for OSS in Operational Technology Environments; Civil Infrastructure Platform Adds New Super-Long-Term Linux Kernel; HTTP/2 Protocol Exploited in Largest DDoS Attack Ever; Docker Announces Three New Products for Secure App Delivery; CloudBees Updates Jenkins and Offers New DevSecOps Platform; Linkerd 2.14 Released with Improved Multi-Cluster Support; NIST Releases Draft of Cybersecurity Framework v2.0; CISA and MITRE Announce Open Source Caldera for OT
  • Attack and defense techniques
    The MITRE ATT&CK and D3FEND knowledge databases provide useful techniques for securing your IT infrastructure.
  • Open source forensics for adaptive detection of threats on CRITIS networks
    The open source tool Velociraptor is at the heart of a solution that automatically detects cyber threats in industrial environments, offering a defensive strategy and protecting critical infrastructures.
  • Improved defense through pen testing
    Discover indicators of compromise with open source pen testing tools.
  • ASM tools and strategies for threat management
    The tools used in attack surface management help identify attack surfaces more precisely and respond to changes in risk situations.
comments powered by Disqus
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=