Skip to content

Latest commit

 

History

History
74 lines (47 loc) · 915 Bytes

red-teaming.md

File metadata and controls

74 lines (47 loc) · 915 Bytes

Red Teaming

Red Team Methodology

Cyber Kill Chain

  1. Reconnaissance
  2. Weaponization
  3. Delivery
  4. Exploitation
  5. Installation
  6. C2
  7. Actions on Objective

C2 Frameworks

Apfell

Caldera

Cobal Strike

Malleable C2 profiles - what is?

Covenant

  • .NET C2 Framework
  • focused on .NET attack surface
  • web interface
  • multi-platform
  • Docker container option
  • developed in C#

Dali

Empire

EvilOSX

Faction C2

Red Team tools

PowerSploit

  • Recon: Includes Powerview
  • Privesc: PowerUp
  • Persistence
  • Antivirus Bypass

Bloodhound

Mimikatx

  • Extract hases
  • Extract Plainttext Psswords
  • Extract Kerberos Tickets
  • PTH
  • Build Golden Tickets

Impacket

  • Collection of python written tools for network protocols
  • Capabilities include:
    • Remote execution
    • Kerberos
    • Credential Extraction
    • MITM

Metasploit Msfvenom payload