Red Teaming/Adversary Simulation Toolkit

Renato Basante Borbolla
22 min readOct 14, 2020

--

Organizations are having a hard time detecting new tactics and techniques employed by cyber criminals looking to breach their defenses. The only sure way to thwart possible cyber threats is to discover any unknown weaknesses and vulnerabilities in the systems and existing defenses. And what better way to do this than to rely on expertise of red and blue teams, and even adopting a security methodology of a purple team.

The red team is considered the offensive side of the security. Red teams think like the attacker, they imitate real-world attacks and mimic adversary techniques and methods, uncover vulnerabilities in an organization’s infrastructure, launch exploits, and report on their findings.

Phases of Red Team Operations and Assessment

A collection of open source and commercial tools that aid in red team operations. This post will help you during red team engagement.

Attack Lifecycle

Contents

  • Reconnaissance
  • Weaponization
  • Delivery
  • Command and Control
  • Lateral Movement
  • Establish Foothold
  • Escalate Privileges
  • Data Exfiltration
  • Misc
  • References

Reconnaissance

Active Intelligence Gathering

Passive Intelligence Gathering

Frameworks

Weaponization

Delivery

Phishing

Watering Hole Attack

Command and Control

Remote Access Tools

Staging

Lateral Movement

Establish Foothold

Escalate Privileges

Domain Escalation

Local Escalation

Data Exfiltration

Misc

Adversary Emulation

Wireless Networks

Embedded & Peripheral Devices Hacking

  • magspoof a portable device that can spoof/emulate any magnetic stripe, credit card or hotel card “wirelessly”, even on standard magstripe (non-NFC/RFID) readers. https://github.com/samyk/magspoof
  • WarBerryPi was built to be used as a hardware implant during red teaming scenarios where we want to obtain as much information as possible in a short period of time with being as stealth as possible. https://github.com/secgroundzero/warberry
  • P4wnP1 is a highly customizable USB attack platform, based on a low cost Raspberry Pi Zero or Raspberry Pi Zero W (required for HID backdoor). https://github.com/mame82/P4wnP1
  • malusb HID spoofing multi-OS payload for Teensy. https://github.com/ebursztein/malusb
  • Fenrir is a tool designed to be used “out-of-the-box” for penetration tests and offensive engagements. Its main feature and purpose is to bypass wired 802.1x protection and to give you an access to the target network. https://github.com/Orange-Cyberdefense/fenrir-ocd
  • poisontap exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons cookies using Raspberry Pi Zero & Node.js. https://github.com/samyk/poisontap
  • WHID WiFi HID Injector — An USB Rubberducky / BadUSB On Steroids. https://github.com/whid-injector/WHID
  • PhanTap is an ‘invisible’ network tap aimed at red teams. With limited physical access to a target building, this tap can be installed inline between a network device and the corporate network. https://github.com/nccgroup/phantap

Software For Team Communication

  • RocketChat is free, unlimited and open source. Replace email & Slack with the ultimate team chat software solution. https://rocket.chat
  • Etherpad is an open source, web-based collaborative real-time editor, allowing authors to simultaneously edit a text document https://etherpad.org

Log Aggregation

C# Offensive Framework

Labs

Scripts

References

Credits:https://github.com/infosecn1nja/Red-Teaming-Toolkit

--

--

Renato Basante Borbolla
Renato Basante Borbolla

Written by Renato Basante Borbolla

Purple Team | Cyber Threat Intelligence | Pentester | Red Team | OSINT | Social Engineer | Ethical Hacker ~ #PowerShell #RedTeam #C2 #PurpleTeam #AWS #Azure

No responses yet