Table of Contents
Concepts
- Introduction to Offensive Cybersecurity
- The Cyber Killchain
- Tactics, Techniques, and Procedures (TTPs)
- Pre-Engagement
- Operational Security (OpSec) for Red Teams
- Passive Recon
- Active Recon
- Vulnerability Validation
- Exploitation
- Post-Exploitation
- Post-Exploitation Reconnaissance
- Persistence Explained
- Credential Access Explained
- Privilege Escalation Explained
- Lateral Movement Explained
- Actions on Objectives Explained
- Post-Exploitation Data Collection
- Post-Exploitation Data Exfiltration
How-To's
Pre-Engagement
- How to Define Rules of Engagement for a Red Team Operation
- How to Scope a Red Team Engagement Safely and Effectively
- How to Create a Threat Model for an Adversary Simulation
- How to Build a Pre-Engagement Questionnaire for Clients
- How to Set Up Internal Red Team Planning Docs