Red Team Fundamentals

      • Click to continue to the next task 

      No Answer

      • Would vulnerability assessments prepare us to detect a real attacker on our networks? (Yay/Nay) 

      Answer : NAY

      During a penetration test, are you concerned about being detected by the client? (Yay/Nay)

      Answer: NAY

      • Highly organised groups of skilled attackers are nowadays referred to as ...

      Answer : Advanced Persistent Threats

      • The goals of a red team engagement will often be referred to as flags or... 

      Answer : crown jewels

      • During a red team engagement, common methods used by attackers are emulated against the target. Such methods are usually called TTPs. What does TTP stand for?

      Answer : Tactics, Techniques and Procedures

      • The main objective of a red team engagement is to detect as many vulnerabilities in as many hosts as possible (Yay/Nay)

      Answer : Nay

      • What cell is responsible for the offensive operations of an engagement? 

      Answer : red cell

      • What cell is the trusted agent considered part of?

      Answer : white cell

      • If an adversary deployed Mimikatz on a target machine, where would they be placed in the Lockheed Martin cyber kill chain? 

      Answer : Installation

      •  What technique's purpose is to exploit the target's system to execute code?

      Answer : Exploitation

      • Click the "View Site" button and follow the example engagement to get the flag 








      Answer : THM{RED_TEAM_ROCKS}

      • Read the above and continue learning! 

      No Answer.