Tryhackme - Red Team Fundamentals

Tryhackme – Red Team Fundamentals

In this walk through, we will be going through the Red Team Fundamentals room from Tryhackme. This room will teach us about the basics of a red team engagement, the main components and stakeholders involved, and how red teaming differs from other cyber security engagements. So, let’s get started.

Red Team Fundamentals

Task 1 – Introduction

Task 1 - Introduction

Task 2 – Vulnerability Assessment and Penetration Tests Limitations

Question 1 – Would vulnerability assessments prepare us to detect a real attacker on our networks? (Yay/Nay)

Nay

Question 2 – During a penetration test, are you concerned about being detected by the client? (Yay/Nay)

Nay

Question 3 – Highly organised groups of skilled attackers are nowadays referred to as …

Advanced Persistent Threats

Task 2 - Vulnerability Assessment and Penetration Tests Limitations

Task 3 – Red Team Engagements

Question 1 – The goals of a red team engagement will often be referred to as flags or…

crown jewels

Question 2 – During a red team engagement, common methods used by attackers are emulated against the target. Such methods are usually called TTPs. What does TTP stand for?

Tactics, Techniques, Procedures

Question 3 – The main objective of a red team engagement is to detect as many vulnerabilities in as many hosts as possible (Yay/Nay)

Nay

Task 3 - Red Team Engagements

Task 4 – Teams and Functions of an Engagement

Question 1 – What cell is responsible for the offensive operations of an engagement?

Red Cell

Question 2 – What cell is the trusted agent considered part of?

White Cell

Task 4 - Teams and Functions of an Engagement

Task 5 – Engagement Structure

Question 1 – If an adversary deployed Mimikatz on a target machine, where would they be placed in the Lockheed Martin cyber kill chain?

Installation

Question 2 – What technique’s purpose is to exploit the target’s system to execute code?

Exploitation

Task 5 - Engagement Structure

Task 6 – Overview of a Red Team Engagement

Question 1 – Click the “View Site” button and follow the example engagement to get the flag

Planning the Engagement

Intelligence Gathering

Phishing Alert

Emulating TTP: Privilege Escalation and Persistence

lsadump::sam

Emulating TTP: Lateral Movement

Reporting and Analysis

THM{RED_TEAM_ROCKS} 

Task 7 – Conclusion

Task 7 - Conclusion

Also Read: Tryhackme – Pyramid Of Pain

So that was “Red Team Fundamentals” for you. In this room, we have learned about the basics of a red team engagement, the main components and stakeholders involved, and how red teaming differs from other cyber security engagements. We have covered Vulnerability Assessments and Penetration testing limits, Red team engagements, Team and functions of the engagement and Engagement structure. At last, we go through an example engagement and got our flag. On that note, i will take your leave and meet you in the next one. So stay tuned and till then, “Hack the planet”.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top