Contents
Introduction
Red teams are "hackers" who help test an organization’s defenses by identifying vulnerabilities and launching attacks in a controlled environment. Red teams are opposed by defenders called blue teams, and both parties work together to provide a comprehensive picture of organizational security readiness.
This section consists of a typical flow that you should follow when red teaming one or more machines.
- 0 - Physical Attacks
- 1 - Internal Recon
- 2 - External Recon
- 3 - Search Exploits
- 4 - Phishing
- 5 - Getting Shell
- 6 - Exfiltration
- 7 - Privilege Escalation