Red Team Engagements

    • Read the above and continue to the next task. 

    No Answer

    • Read the example client objectives and answer the questions below. 

    No Answer

    • Below is an example of the client objectives of a mature organization with a strong security posture.

    Example 1 - Global Enterprises:

    Objectives:

    Identify system misconfigurations and network weaknesses.
    Focus on exterior systems.
    Determine the effectiveness of endpoint detection and response systems.
    Evaluate overall security posture and response.
    SIEM and detection measures.
    Remediation.
    Segmentation of DMZ and internal servers.
     Use of white cards is permitted depending on downtime and length.
      Evaluate the impact of data exposure and exfiltration.

    Scope:

      System downtime is not permitted under any circumstances.
      Any form of DDoS or DoS is prohibited.
      Use of any harmful malware is prohibited; this includes ransomware and other variations.
      Exfiltration of PII is prohibited. Use arbitrary exfiltration data.
        Attacks against systems within 10.0.4.0/22 are permitted.
        Attacks against systems within 10.0.12.0/22 are prohibited.
        Bean Enterprises will closely monitor interactions with the DMZ and critical/production systems.
          Any interaction with "*.bethechange.xyz" is prohibited.
          All interaction with "*.globalenterprises.thm" is permitted.

    No Answer

    • What CIDR range is permitted to be attacked?

    Answer : 10.0.4.0/22

    • Is the use of white cards permitted? (Y/N)

    Answer : y

    • Are you permitted to access "*.bethechange.xyz?" (Y/N)

    Answer : n

    • Download the sample rules of engagement from the task files. Once downloaded, read the sample document and answer the questions below.

    No Answer.
    •  How many explicit restriction are specified?


    Answer : 3

    • What is the first access type mentioned in the document?


    Answer : phishing

    • Is the red team permitted to attack 192.168.1.0/24? (Y/N)

    Answer : n

    • Read the above and move on to engagement documentation. 

    No Answer.

    • Read the above and move on to the upcoming engagement specific tasks. 

    No Answer.

    • Read the example CONOPS and answer the questions below.

    No Answer.

    • Based on customer security posture and maturity, the TTP of the threat group: FIN6, will be employed throughout the engagement.

    No Answer.

    • How long will the engagement last?


    Answer : 1 month

    • How long is the red cell expected to maintain persistence?


    Answer : 3 weeks

    • Answer : lsaiso.exe


    Answer : Cobalt Strike

    •  Navigate to the "View Site"  button and read the provided resource plan. Once complete, answer the questions below.

    No Answer.


    • When will the engagement end?

    Answer : 11/14/2021

    •  What is the budget the red team has for AWS cloud cost?

    Answer : $1000

    • Are there any miscellaneous requirements for the engagement? (Y/N)

    Answer : n

    • Navigate to the "View Site"  button and read the provided operations plan. Once complete, answer the questions below. 

    No Answer.


    •  What phishing method will be employed during the initial access phase?

    Answer : spearphishing

    • What site will be utilized for communication between the client and red cell?

    Answer :  vectr.io

    •  If there is a system outage, the red cell will continue with the engagement. (T/F)

    Answer : F

    • Navigate to the "View Site"  button and read the provided mission plan. Once complete, answer the questions below. 

    No Answer.


    • When will the phishing campaign end? (mm/dd/yyyy)

    Answer : 10/23/2021

    • Are you permitted to attack 10.10.6.78? (Y/N)

    Answer : N

    • When a stopping condition is encountered, you should continue working and determine the solution yourself without a team lead. (T/F)

    Answer : F

    • Read the above and continue learning! 

    No Answer.