GistTree.Com
Entertainment at it's peak. The news is by your side.

What is this? – Red Teaming Experiments

0

That is publicly accessible personal notes at https://ired.crew and https://github.com/mantvydasb/RedTeam-Tactics-and-Systems about my pentesting / crimson teaming experiments in a controlled atmosphere that beget playing with assorted instruments and suggestions passe by penetration testers, crimson teams and staunch adversaries.

That is my manner of studying issues – by doing, following, tinkering, exploring, repeating and taking notes.

  • Dwell now no longer retract the whole lot or anything in these notes for granted

  • Dwell now no longer question the notes to be exhaustive or covering the suggestions or the artifacts they damage in fleshy

  • Inquire of mistakes in the notes

  • In any admire times seek the advice of additional assets

The next sub-pages of this page will explore one of the crucial frequent offensive security suggestions interesting gaining code execution, lateral circulation, persistence and extra.

These forms of suggestions are chanced on by other security researchers and I operate now no longer claim their ownership. I strive and reference the sources I exercise the staunch I will, but in the event you issue I’ve missed something, please procure in contact and I will repair it actual now.

The purpose of this project is easy – read other researchers work, operate some frequent/weird attacking suggestions in a lab atmosphere, operate my get reasearch and:

  • know the manner assorted cyber attacks and suggestions might perhaps well even be completed and the device in which they work

  • learn about how malware is written

  • write code to additional understand the instruments and suggestions passe by attackers and malware authors

  • learn extra about C++, Windows internals and Windows APIs

  • learn about what artifacts the suggestions and instruments leave in the motivate of on the endpoint

  • strive out assorted alternate instruments for pentesting, coding, debugging, reverse engineering, malware diagnosis, and change into extra profficient in utilizing them

  • retract notes for future reference

Comply with me on twitter:

Read More

Leave A Reply

Your email address will not be published.