Red Teaming
Red Teaming
One-liner: Simulating real-world adversaries to test an organization's detection and response capabilities.
🎯 What Is It?
Red teaming is an adversarial security assessment where a team emulates threat actors' tactics, techniques, and procedures (TTPs) to identify security gaps that traditional testing might miss.
🔴 Red Team vs Penetration Testing
| Aspect | Red Team | Penetration Test |
|---|---|---|
| Goal | Test detection & response | Find vulnerabilities |
| Scope | Full organization | Defined targets |
| Duration | Weeks to months | Days to weeks |
| Stealth | Evade detection | Not a priority |
| Knowledge | Minimal (black box) | Often documented |
| Blue Team Aware? | Usually not | Usually yes |
🚩 Red Team Phases
- Reconnaissance — OSINT, social engineering research
- Initial Access — Phishing, exploits, physical access
- Execution — Running malicious code
- Persistence — Maintaining access
- Privilege Escalation — Gaining higher access
- Defense Evasion — Avoiding detection
- Lateral Movement — Moving through network
- Collection — Gathering target data
- Exfiltration — Extracting data
- Impact — Achieving objectives
🛠️ Common Red Team Tools
| Tool | Purpose |
|---|---|
| Cobalt Strike | C2 framework |
| Metasploit | Exploitation |
| BloodHound | AD enumeration |
| Mimikatz | Credential dumping |
| Phishing frameworks | Initial access |
🤝 Purple Teaming
When red and blue teams collaborate:
- Red executes TTPs openly
- Blue observes and tunes detections
- Both improve together
🎤 Interview STAR Example
Situation: Organization wanted to test SOC detection capabilities before a compliance audit.
Task: Conduct a red team engagement simulating an APT actor.
Action: Performed spear phishing to gain initial access, escalated privileges using Kerberoasting, moved laterally via RDP, and exfiltrated simulated sensitive data.
Result: Identified 12 detection gaps. SOC implemented new alerts. Follow-up engagement showed 80% improvement in detection time.
🎯 Frameworks
- MITRE ATT&CK — Adversary tactics & techniques
- Kill Chain — Lockheed Martin attack phases
- PTES — Penetration Testing Execution Standard
🔗 Related Concepts
📚 References
- MITRE ATT&CK Framework
- Red Team Development and Operations Guide