Post

04 - Red Team Engagement Structure

A core function of the Red team is to emulate and adversary by assessing how an adversary would use their tactics techniques and procedures as well as tools in the network environment of a client. The red team can use a number of cyber kill chains to summarise the steps and procedures that they have taken in a particular assignment

The blue team on the other hand use cyber kill chains to map behaviours of adversaries and breakdown their actions during an attack. The blue team uses the cyber kill chains to map adversaries TTPs to the red team engagement

Examples of Cyber Kill Chains

  • Lockheed martin cyber kill chain
  • Unified kill chain
  • Varonis Cyber Kill chain
  • Active directory attack cycle
  • MITRE ATT&CK Framework

For tryhackme red team we will use the Lockheed Martin Cyber Kill chain which focuses on a perimeter or external breach

Screenshot 2023-05-15 at 13.45.13.png

TechniquePurposeExample
ReconnaissanceObtain Information about the targetHarvesting emails and OSINT
WeaponizationDeliverable payloadmalicious office documents
DeliveryHow the exploit will be delivered to the targetEmail, web, USB
ExploitationExecute the code in the the target’s environmentZeroLogon, MS17-010
InstallationInstall malware and other toolingMimikatza rubeus
Command and ControlControl the compromised asset from a remote controllerEmpire Cobalt strike
Actions on Objectivesany end objectives - ransomware data exfiltrationConti Lockbit 2.0
This post is licensed under CC BY 4.0 by the author.