In this walk through, we will be going through the Red Team Fundamentals room from Tryhackme. This room will teach us about the basics of a red team engagement, the main components and stakeholders involved, and how red teaming differs from other cyber security engagements. So, let’s get started.
Table of Contents
Task 1 – Introduction
Task 2 – Vulnerability Assessment and Penetration Tests Limitations
Question 1 – Would vulnerability assessments prepare us to detect a real attacker on our networks? (Yay/Nay)
Nay
Question 2 – During a penetration test, are you concerned about being detected by the client? (Yay/Nay)
Nay
Question 3 – Highly organised groups of skilled attackers are nowadays referred to as …
Advanced Persistent Threats
Task 3 – Red Team Engagements
Question 1 – The goals of a red team engagement will often be referred to as flags or…
crown jewels
Question 2 – During a red team engagement, common methods used by attackers are emulated against the target. Such methods are usually called TTPs. What does TTP stand for?
Tactics, Techniques, Procedures
Question 3 – The main objective of a red team engagement is to detect as many vulnerabilities in as many hosts as possible (Yay/Nay)
Nay
Task 4 – Teams and Functions of an Engagement
Question 1 – What cell is responsible for the offensive operations of an engagement?
Red Cell
Question 2 – What cell is the trusted agent considered part of?
White Cell
Task 5 – Engagement Structure
Question 1 – If an adversary deployed Mimikatz on a target machine, where would they be placed in the Lockheed Martin cyber kill chain?
Installation
Question 2 – What technique’s purpose is to exploit the target’s system to execute code?
Exploitation
Task 6 – Overview of a Red Team Engagement
Question 1 – Click the “View Site” button and follow the example engagement to get the flag
THM{RED_TEAM_ROCKS}
Task 7 – Conclusion
Also Read: Tryhackme – Pyramid Of Pain
So that was “Red Team Fundamentals” for you. In this room, we have learned about the basics of a red team engagement, the main components and stakeholders involved, and how red teaming differs from other cyber security engagements. We have covered Vulnerability Assessments and Penetration testing limits, Red team engagements, Team and functions of the engagement and Engagement structure. At last, we go through an example engagement and got our flag. On that note, i will take your leave and meet you in the next one. So stay tuned and till then, “Hack the planet”.