HackerSploit: Red Team Security Series, Part 1
Chapter 1: Red Team Adversary Emulation With Caldera
Run Time: Approx. I hour and 35 minutes
Introduction to Red Team operations
Red Teaming vs Pentesting
Adversary emulation explained
MITRE ATT&CK Framework
Caldera Terminology
How to setup Caldera
Adversary emulation wtih Caldera
Chapter 2: Red Team Reconnaissance Techniques
Run Time: Approx. 1 hour and 25 minutes
Passive reconnaissance techniques & tools
Active reconnaissance techniques & tools
Automated reconnaissance frameworks
Chapter 3: Windows Red Team Exploitation Techniques
Run Time: Approx. 47 minutes
Installing and configuring PowerShell-Empire and Starkiller
Setting up a PowerShell-Empire stager and listener
Generating a malicious document with Luckystrike
Chapter 4: Linux Red Team Exploitation Techniques
Run Time: Approx. 30 minutes
Chapter 5: Windows Red Team Persistence Techniques
Run Time: Approx. 43 minutes
Persistence through the Windows Registry
Persistence through scheduled tasks
Persistence through local accounts
Chapter 6: Windows Red Team Credential Access Techniques
Run Time: Approx. 40 minutes
—
HackerSploit: Red Team Security Series, Part 2
Chapter 1: Windows Red Team Defense Evasion Techniques
Run Time: Approx. 37 minutes
Chapter 2: Windows Red Team Privilege Escalation Techniques
Run Time: Approx. 45 minutes
Chapter 3: Linux Red Team Privilege Escalation Techniques
Run Time: Approx. 40 minutes
Chapter 4: Linux Red Team Persistence Techniques
Run Time: Approx. 55 minutes
Persistence via SSH keys
Creating a privileged local account
Unix shell configuration modification
Persistence via web shells
Persistence via Cron jobs
Chapter 5: Linux Defense Evasion - Hiding Linux Processes
Run Time: Approx. 20 minutes
- Hiding processes with Libprocesshider
Chapter 6: Linux Red Team Defense Evasion - Rootkits
Run Time: Approx. 28 minutes
Chapter 7: Windows Red Team Lateral Movement Techniques
Run Time: Approx. 25 minutes