Jump to content

The Red Team Guide


SWAT
 Share

Recommended Posts

A pratical guide for Red Teams and Offensive Security

Table of Content:

  • Chapter 1: Red Teaming and Red Teams Overview
  • Chapter 2: Phase 1: Open-Source Intelligence (OSINT) Reconnaissance
  • Chapter 3: Phase 2: Enumeration
  • Chapter 4: Phase 2a: External Recon 
  • Chapter 5: Phase 2b: Internal Recon
  • Chapter 6: Social Engineering Attacks (Spear phishing)
  • Chapter 7: Bypassing Windows User Account Control (UAC)
  • Chapter 8: Powershell For Red Teams
  • Chapter 9: Lateral Movement
  • Chapter 10: Network Domination & Persistence
  • Chapter 11: Evasion & Obfuscation Techniques
  • Chapter 12: Data Exfiltration 
  • Chapter 13: Attacking Linux/Unix Environments 
  • Chapter 14: Attacking ICS/SCADA
  • Chapter 15: Privilege Escalation
  • Chapter 16: Virtualization Attacks
  • Further Reading

 

Download:

 

This is the hidden content, please

Link to comment
Share on other sites

  • 4 weeks later...
On 12/13/2021 at 3:00 PM, SWAT said:

A pratical guide for Red Teams and Offensive Security

Table of Content:

  • Chapter 1: Red Teaming and Red Teams Overview
  • Chapter 2: Phase 1: Open-Source Intelligence (OSINT) Reconnaissance
  • Chapter 3: Phase 2: Enumeration
  • Chapter 4: Phase 2a: External Recon 
  • Chapter 5: Phase 2b: Internal Recon
  • Chapter 6: Social Engineering Attacks (Spear phishing)
  • Chapter 7: Bypassing Windows User Account Control (UAC)
  • Chapter 8: Powershell For Red Teams
  • Chapter 9: Lateral Movement
  • Chapter 10: Network Domination & Persistence
  • Chapter 11: Evasion & Obfuscation Techniques
  • Chapter 12: Data Exfiltration 
  • Chapter 13: Attacking Linux/Unix Environments 
  • Chapter 14: Attacking ICS/SCADA
  • Chapter 15: Privilege Escalation
  • Chapter 16: Virtualization Attacks
  • Further Reading

 

Download:

 

 

Hidden Content

  • Reply to this topic to see the hidden content.

 

 

Link to comment
Share on other sites

  • 1 month later...
  • 4 weeks later...
On 12/13/2021 at 8:00 AM, SWAT said:

A pratical guide for Red Teams and Offensive Security

Table of Content:

  • Chapter 1: Red Teaming and Red Teams Overview
  • Chapter 2: Phase 1: Open-Source Intelligence (OSINT) Reconnaissance
  • Chapter 3: Phase 2: Enumeration
  • Chapter 4: Phase 2a: External Recon 
  • Chapter 5: Phase 2b: Internal Recon
  • Chapter 6: Social Engineering Attacks (Spear phishing)
  • Chapter 7: Bypassing Windows User Account Control (UAC)
  • Chapter 8: Powershell For Red Teams
  • Chapter 9: Lateral Movement
  • Chapter 10: Network Domination & Persistence
  • Chapter 11: Evasion & Obfuscation Techniques
  • Chapter 12: Data Exfiltration 
  • Chapter 13: Attacking Linux/Unix Environments 
  • Chapter 14: Attacking ICS/SCADA
  • Chapter 15: Privilege Escalation
  • Chapter 16: Virtualization Attacks
  • Further Reading

 

Download:

 

 

Hidden Content

  • Reply to this topic to see the hidden content.

 

tanks

Link to comment
Share on other sites

  • 5 weeks later...
  • 2 weeks later...
  • 5 weeks later...
  • 4 months later...

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...