Hackersploit Red Team Series
Traducciones al EspañolEstamos traduciendo nuestros guías y tutoriales al Español. Es posible que usted esté viendo una traducción generada automáticamente. Estamos trabajando con traductores profesionales para verificar las traducciones de nuestro sitio web. Este proyecto es un trabajo en curso.
The rate of data breaches and APT attacks has been rapidly increasing during the period of COVID-19. Organizations are starting to recognize that their IT infrastructure has weaknesses and vulnerabilities, at great expense to their operations and customer data. For medium to large enterprise organizations, a defense-in-depth strategy that includes testing your defenses is required. This is where red teaming comes into play.
The objective of red teaming is to determine the weaknesses that can affect the organization and determine the effectiveness of the defenses currently in place.
This series aims to teach infosec and cybersecurity professionals the various red team techniques that can be used to attack and determine vulnerabilities in their organization’s security.
Guides
This series is split into two parts, with 13 guides in total.
Part 1
Red Team Adversary Emulation With Caldera: This guide introduces you to Red Team operations takes you through the process of setting up and utilizing Caldera for adversary emulation.
Red Team Reconnaissance Techniques: This guide covers the process of how to perform both passive and active reconnaissance for Red Team operations.
Windows Red Team Exploitation Techniques: This guide covers the process of setting up PowerShell-Empire as a C2 server and how to generate a macro Excel document that can be used to gain an initial foothold on a target system.
Linux Red Team Exploitation Techniques: This guide covers the process of identifying and exploiting vulnerabilities on a public facing Linux server.
Windows Red Team Persistence Techniques: This guide covers the process of setting up and maintaining persistent access on Windows targets.
Windows Red Team Credential Access Techniques: This guide covers the process of extracting cleartext passwords and hashes from Windows system by leveraging tools like Mimikatz.
Part 2
Windows Red Team Defense Evasion Techniques: This guide explains and demonstrates the process of evading AV detection on Windows systems.
Windows Red Team Privilege Escalation Techniques: This guide covers various techniques that can be used to elevate your privileges on Windows systems.
Linux Red Team Privilege Escalation Techniques: This guide covers various techniques that can be used to elevate your privileges on Linux systems.
Linux Red Team Persistence Techniques: This guide covers the process of setting up and maintaining persistent access on Linux targets.
Linux Defense Evasion - Hiding Linux Processes: This guide covers the process of evading detection on Linux systems by hiding processes.
Linux Red Team Defense Evasion - Rootkits: This guide covers the process of evading detection on Linux systems by leveraging rootkits.
Windows Red Team Lateral Movement Techniques: This guide covers the process of performing lateral movement on Windows systems.
This page was originally published on