Red Team Operations
Advanced adversary simulation techniques that go beyond traditional penetration testing. Red team engagements focus on realistic attack scenarios, detection evasion, and testing organizational resilience against sophisticated threats.
Advanced Material
Red Team Techniques
C2 Frameworks
Command and control infrastructure setup, beacon operations, and C2 channel management.
Initial Access
Phishing, payload delivery, HTML smuggling, and modern initial access techniques.
Defense Evasion
AMSI bypass, EDR evasion, syscalls, unhooking, and sleep obfuscation techniques.
Operational Security
IOC management, artifact cleanup, traffic blending, and attribution avoidance.
Tradecraft
Credential harvesting, lateral movement, domain escalation, and achieving objectives.
EDR Bypass
Per-EDR analysis, userland unhooking, direct/indirect syscalls, BYOVD, ETW blinding, and kernel callback removal.
Payload Development
Custom shellcode loaders in Nim/Rust/Go, reflective DLL injection, process hollowing, encryption, and anti-analysis.
Red Team vs Pentest
| Aspect | Penetration Test | Red Team |
|---|---|---|
| Objective | Find vulnerabilities | Test detection & response |
| Scope | Defined systems | Goal-based (crown jewels) |
| Duration | 1-3 weeks | 2-6 months |
| Detection | Often ignored | Must evade |
| Awareness | IT team knows | Limited awareness |
Quick Reference
| Topic | Key Tools | Focus Area |
|---|---|---|
| C2 Frameworks | Sliver, Havoc, Mythic | Beacon ops, listeners, infrastructure |
| Initial Access | GoPhish, HTML smuggling | Phishing, payload delivery |
| Evasion | Syscalls, unhooking | AMSI, ETW, EDR bypass |
| OPSEC | Traffic analysis, timestomp | Artifact cleanup, attribution |
| Tradecraft | Rubeus, Mimikatz, WMI | Creds, lateral movement, pivoting |
📚 Recommended Reading
Evading EDR
Matt Hand (2023)
Deep dive into EDR internals, syscall evasion, ETW blinding, callback removal, and modern detection bypass techniques.
Black Hat Python, 2nd Edition
Justin Seitz & Tim Arnold (2021)
Build custom red team tools — network sniffers, keyloggers, C2 implants, and offensive automation in Python.
Related Topics
As an Amazon Associate I earn from qualifying purchases.