Planning and Executing a Red Team Engagement

Planning and Executing a Red Team Engagement

via YouTube Direct link

Introduction

1 of 36

1 of 36

Introduction

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Planning and Executing a Red Team Engagement

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Talk Outline
  3. 3 Wargames
  4. 4 Wargame Examples - CTF
  5. 5 Engagement Definition
  6. 6 Terminology Review
  7. 7 Red Teaming - Defined
  8. 8 What is a Red Team Exercise?
  9. 9 Security Maturity Models
  10. 10 Red Team - 3 Target Areas
  11. 11 Wargaming Computer Security
  12. 12 New Ideas for Security Testing
  13. 13 What is a Threat Scenario
  14. 14 Threat Scenarios same as RT?
  15. 15 This is just Red Teaming!
  16. 16 Example Scenario
  17. 17 Cobalt Strike - Redirectors
  18. 18 Putter Panda c2 callback
  19. 19 Cobalt Strike FTW!
  20. 20 C2: Internal or External
  21. 21 DNS Registration
  22. 22 Cloud Service Provider
  23. 23 Traffic Generation
  24. 24 ACME Gas - Exercise
  25. 25 Threat Model: Hacktivism
  26. 26 Scenario Development in ROE
  27. 27 ACME Gas - White Card Access
  28. 28 Lateral Movement into Servers
  29. 29 Lateral into Server Subnet
  30. 30 The Hunt Develops
  31. 31 And the Game would continue..
  32. 32 Cobalt Strike Report - MD5
  33. 33 Cobalt Strike - Activity
  34. 34 Cobalt Strike - Session
  35. 35 Cobalt Strike - Pivot Path
  36. 36 Closing Thoughts

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.