Red Team Guide

Published Apr 1, 2022



Red teams are "hackers" who help test an organization’s defenses by identifying vulnerabilities and launching attacks in a controlled environment. Red teams are opposed by defenders called blue teams, and both parties work together to provide a comprehensive picture of organizational security readiness.

This section consists of a typical flow that you should follow when red teaming one or more machines.

0 - Physical Attacks

1 - Internal Recon

2 - External Recon

3 - Search Exploits

4 - Phishing

5 - Getting Shell

6 - Exfiltration

7 - Privilege Escalation