Red Team Methodology - A Naked Look
Offered By: YouTube
Course Description
Overview
Explore a comprehensive conference talk on Red Team Methodology, offering a detailed look at the principles and practices of red teaming. Delve into the goals, target maturity, and key differences of red team operations. Gain insights into pre-engagement activities, external and internal tactics, and communication strategies. Learn about various tools and techniques, including NTLM bruting, social engineering, infrastructure automation with Ansible, and persistence methods. Discover how to effectively blend in during operations and understand the importance of proper reporting. Enhance your red teaming skills with practical knowledge from an experienced professional in the field.
Syllabus
Intro
Goals
Red Team Target Maturity
Red Team Key Difference
Why this talk? I'm already a pro
My Red Team Core Principals
Core Principals: Pre-Gig
Question
Domains
Favorite Dorks
Breach Data
Core Principals: External
NTLM Bruting
Core Principals: SE
Infr. Automation with Ansible
Ansible - Tasks
Ansible - Modules
Template Injection
Azure Information Protection (AIP)
Core Principals: Internal
Tools/Tactics
Lowpriv - Chrome
Persistence & Movement
Blending In
COM Hijacking
Core Principals: Communication/Reporting
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network