red-team-tactics

Adversary simulation principles based on MITRE ATT&CK framework.

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "red-team-tactics" with this command: npx skills add vudovn/antigravity-kit/vudovn-antigravity-kit-red-team-tactics

Red Team Tactics

Adversary simulation principles based on MITRE ATT&CK framework.

  1. MITRE ATT&CK Phases

Attack Lifecycle

RECONNAISSANCE → INITIAL ACCESS → EXECUTION → PERSISTENCE ↓ ↓ ↓ ↓ PRIVILEGE ESC → DEFENSE EVASION → CRED ACCESS → DISCOVERY ↓ ↓ ↓ ↓ LATERAL MOVEMENT → COLLECTION → C2 → EXFILTRATION → IMPACT

Phase Objectives

Phase Objective

Recon Map attack surface

Initial Access Get first foothold

Execution Run code on target

Persistence Survive reboots

Privilege Escalation Get admin/root

Defense Evasion Avoid detection

Credential Access Harvest credentials

Discovery Map internal network

Lateral Movement Spread to other systems

Collection Gather target data

C2 Maintain command channel

Exfiltration Extract data

  1. Reconnaissance Principles

Passive vs Active

Type Trade-off

Passive No target contact, limited info

Active Direct contact, more detection risk

Information Targets

Category Value

Technology stack Attack vector selection

Employee info Social engineering

Network ranges Scanning scope

Third parties Supply chain attack

  1. Initial Access Vectors

Selection Criteria

Vector When to Use

Phishing Human target, email access

Public exploits Vulnerable services exposed

Valid credentials Leaked or cracked

Supply chain Third-party access

  1. Privilege Escalation Principles

Windows Targets

Check Opportunity

Unquoted service paths Write to path

Weak service permissions Modify service

Token privileges Abuse SeDebug, etc.

Stored credentials Harvest

Linux Targets

Check Opportunity

SUID binaries Execute as owner

Sudo misconfiguration Command execution

Kernel vulnerabilities Kernel exploits

Cron jobs Writable scripts

  1. Defense Evasion Principles

Key Techniques

Technique Purpose

LOLBins Use legitimate tools

Obfuscation Hide malicious code

Timestomping Hide file modifications

Log clearing Remove evidence

Operational Security

  • Work during business hours

  • Mimic legitimate traffic patterns

  • Use encrypted channels

  • Blend with normal behavior

  1. Lateral Movement Principles

Credential Types

Type Use

Password Standard auth

Hash Pass-the-hash

Ticket Pass-the-ticket

Certificate Certificate auth

Movement Paths

  • Admin shares

  • Remote services (RDP, SSH, WinRM)

  • Exploitation of internal services

  1. Active Directory Attacks

Attack Categories

Attack Target

Kerberoasting Service account passwords

AS-REP Roasting Accounts without pre-auth

DCSync Domain credentials

Golden Ticket Persistent domain access

  1. Reporting Principles

Attack Narrative

Document the full attack chain:

  • How initial access was gained

  • What techniques were used

  • What objectives were achieved

  • Where detection failed

Detection Gaps

For each successful technique:

  • What should have detected it?

  • Why didn't detection work?

  • How to improve detection

  1. Ethical Boundaries

Always

  • Stay within scope

  • Minimize impact

  • Report immediately if real threat found

  • Document all actions

Never

  • Destroy production data

  • Cause denial of service (unless scoped)

  • Access beyond proof of concept

  • Retain sensitive data

  1. Anti-Patterns

❌ Don't ✅ Do

Rush to exploitation Follow methodology

Cause damage Minimize impact

Skip reporting Document everything

Ignore scope Stay within boundaries

Remember: Red team simulates attackers to improve defenses, not to cause harm.

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

General

frontend-design

No summary provided by upstream source.

Repository SourceNeeds Review
188-vudovn
General

mobile-design

No summary provided by upstream source.

Repository SourceNeeds Review
144-vudovn
General

webapp-testing

No summary provided by upstream source.

Repository SourceNeeds Review
102-vudovn
General

systematic-debugging

No summary provided by upstream source.

Repository SourceNeeds Review