Skip to main content

Overview

The red-team-tactics skill provides adversary simulation principles based on the MITRE ATT&CK framework. It covers the complete attack lifecycle, from reconnaissance through exfiltration, helping defenders understand attacker methodologies.

What This Skill Provides

  • MITRE ATT&CK Phases: Complete attack lifecycle understanding
  • Reconnaissance Principles: Passive and active information gathering
  • Initial Access Vectors: Entry point selection and exploitation
  • Privilege Escalation: Windows and Linux elevation techniques
  • Defense Evasion: Avoiding detection and maintaining stealth
  • Lateral Movement: Spreading across internal networks
  • Active Directory Attacks: Kerberoasting, DCSync, Golden Tickets
  • Reporting Principles: Documenting attack chains and detection gaps
  • Ethical Boundaries: Responsible adversary simulation

MITRE ATT&CK Phases

Attack Lifecycle

RECONNAISSANCE → INITIAL ACCESS → EXECUTION → PERSISTENCE
       ↓              ↓              ↓            ↓
   PRIVILEGE ESC → DEFENSE EVASION → CRED ACCESS → DISCOVERY
       ↓              ↓              ↓            ↓
LATERAL MOVEMENT → COLLECTION → C2 → EXFILTRATION → IMPACT

Phase Objectives

PhaseObjective
ReconMap attack surface
Initial AccessGet first foothold
ExecutionRun code on target
PersistenceSurvive reboots
Privilege EscalationGet admin/root
Defense EvasionAvoid detection
Credential AccessHarvest credentials
DiscoveryMap internal network
Lateral MovementSpread to other systems
CollectionGather target data
C2Maintain command channel
ExfiltrationExtract data

Use Cases

When to Use This Skill

  • Red team engagements
  • Adversary simulation exercises
  • Security control validation
  • Detection engineering
  • Security awareness training
  • Incident response preparation

Example Scenarios

  1. Red Team Exercise: “Simulate an attack on this infrastructure”
  2. Detection Validation: “Test if our SIEM detects lateral movement”
  3. Security Assessment: “Identify detection gaps in our defenses”
  4. Training: “Demonstrate how attackers move through networks”

Reconnaissance Principles

Passive vs Active

TypeTrade-off
PassiveNo target contact, limited info
ActiveDirect contact, more detection risk

Information Targets

CategoryValue
Technology stackAttack vector selection
Employee infoSocial engineering
Network rangesScanning scope
Third partiesSupply chain attack

Initial Access Vectors

Selection Criteria

VectorWhen to Use
PhishingHuman target, email access
Public exploitsVulnerable services exposed
Valid credentialsLeaked or cracked
Supply chainThird-party access

Privilege Escalation Principles

Windows Targets

CheckOpportunity
Unquoted service pathsWrite to path
Weak service permissionsModify service
Token privilegesAbuse SeDebug, etc.
Stored credentialsHarvest

Linux Targets

CheckOpportunity
SUID binariesExecute as owner
Sudo misconfigurationCommand execution
Kernel vulnerabilitiesKernel exploits
Cron jobsWritable scripts

Defense Evasion Principles

Key Techniques

TechniquePurpose
LOLBinsUse legitimate tools
ObfuscationHide malicious code
TimestompingHide file modifications
Log clearingRemove evidence

Operational Security

  • Work during business hours
  • Mimic legitimate traffic patterns
  • Use encrypted channels
  • Blend with normal behavior

Lateral Movement Principles

Credential Types

TypeUse
PasswordStandard auth
HashPass-the-hash
TicketPass-the-ticket
CertificateCertificate auth

Movement Paths

  • Admin shares
  • Remote services (RDP, SSH, WinRM)
  • Exploitation of internal services

Active Directory Attacks

Attack Categories

AttackTarget
KerberoastingService account passwords
AS-REP RoastingAccounts without pre-auth
DCSyncDomain credentials
Golden TicketPersistent domain access

Reporting Principles

Attack Narrative

Document the full attack chain:
  1. How initial access was gained
  2. What techniques were used
  3. What objectives were achieved
  4. Where detection failed

Detection Gaps

For each successful technique:
  • What should have detected it?
  • Why didn’t detection work?
  • How to improve detection

Ethical Boundaries

Always

  • Stay within scope
  • Minimize impact
  • Report immediately if real threat found
  • Document all actions

Never

  • Destroy production data
  • Cause denial of service (unless scoped)
  • Access beyond proof of concept
  • Retain sensitive data

Attack Chain Example

Phase 1: Reconnaissance

1. Identify company domain and email format
2. Find employee names on LinkedIn
3. Map external IP ranges
4. Enumerate exposed services

Phase 2: Initial Access

1. Send phishing email to identified employees
2. User clicks link, executes payload
3. Establish C2 channel

Phase 3: Privilege Escalation

1. Enumerate user privileges
2. Find unquoted service path
3. Write malicious executable to path
4. Restart service → SYSTEM access

Phase 4: Lateral Movement

1. Dump credentials from LSASS
2. Find domain admin hash
3. Pass-the-hash to domain controller
4. DCSync to extract all domain credentials

MITRE ATT&CK Mapping

Every technique used should be mapped to:
  • Tactic: Why (e.g., Privilege Escalation)
  • Technique: What (e.g., T1574.009 - Unquoted Service Path)
  • Procedure: How (specific implementation)

Detection Engineering

For Each Technique

Document:
  • Observable artifacts: What can be detected?
  • Detection logic: How to detect it?
  • False positive rate: How noisy is detection?
  • Evasion potential: Can it be bypassed?

Anti-Patterns to Avoid

❌ Don’t✅ Do
Rush to exploitationFollow methodology
Cause damageMinimize impact
Skip reportingDocument everything
Ignore scopeStay within boundaries
  • vulnerability-scanner: Finding exploitable vulnerabilities
  • api-patterns: API security testing
  • clean-code: Secure coding practices

Which Agents Use This Skill

  • security-auditor: Uses for attack simulation
  • penetration-tester: Primary user for red team operations

Operational Considerations

Scope Definition

Before starting:
  • Target systems clearly defined
  • Out-of-scope systems identified
  • Acceptable attack vectors agreed
  • Impact limitations set
  • Communication plan established

During Engagement

  • Maintain detailed logs of all actions
  • Report critical findings immediately
  • Stop if unexpected damage occurs
  • Coordinate with blue team if needed

Post-Engagement

  • Clean up artifacts
  • Remove persistence mechanisms
  • Deliver comprehensive report
  • Conduct debrief with defenders

Tools Available

  • Read, Glob, Grep: For reconnaissance and analysis

Remember: Red team simulates attackers to improve defenses, not to cause harm. Always operate ethically and within defined scope.

Build docs developers (and LLMs) love