Traducciones al Español
Estamos traduciendo nuestros guías y tutoriales al Español. Es posible que usted esté viendo una traducción generada automáticamente. Estamos trabajando con traductores profesionales para verificar las traducciones de nuestro sitio web. Este proyecto es un trabajo en curso.
Create a Linode account to try this guide with a $ credit.
This credit will be applied to any valid services used during your first  days.

The rate of data breaches and APT attacks has been rapidly increasing during the period of COVID-19. Organizations are starting to recognize that their IT infrastructure has weaknesses and vulnerabilities, at great expense to their operations and customer data. For medium to large enterprise organizations, a defense-in-depth strategy that includes testing your defenses is required. This is where red teaming comes into play.

The objective of red teaming is to determine the weaknesses that can affect the organization and determine the effectiveness of the defenses currently in place.

This series aims to teach infosec and cybersecurity professionals the various red team techniques that can be used to attack and determine vulnerabilities in their organization’s security.

Guides

This series is split into two parts, with 13 guides in total.

Part 1

  1. Red Team Adversary Emulation With Caldera : This guide introduces you to Red Team operations takes you through the process of setting up and utilizing Caldera for adversary emulation.

  2. Red Team Reconnaissance Techniques : This guide covers the process of how to perform both passive and active reconnaissance for Red Team operations.

  3. Windows Red Team Exploitation Techniques : This guide covers the process of setting up PowerShell-Empire as a C2 server and how to generate a macro Excel document that can be used to gain an initial foothold on a target system.

  4. Linux Red Team Exploitation Techniques : This guide covers the process of identifying and exploiting vulnerabilities on a public facing Linux server.

  5. Windows Red Team Persistence Techniques : This guide covers the process of setting up and maintaining persistent access on Windows targets.

  6. Windows Red Team Credential Access Techniques : This guide covers the process of extracting cleartext passwords and hashes from Windows system by leveraging tools like Mimikatz.

Part 2

  1. Windows Red Team Defense Evasion Techniques : This guide explains and demonstrates the process of evading AV detection on Windows systems.

  2. Windows Red Team Privilege Escalation Techniques : This guide covers various techniques that can be used to elevate your privileges on Windows systems.

  3. Linux Red Team Privilege Escalation Techniques : This guide covers various techniques that can be used to elevate your privileges on Linux systems.

  4. Linux Red Team Persistence Techniques : This guide covers the process of setting up and maintaining persistent access on Linux targets.

  5. Linux Defense Evasion - Hiding Linux Processes : This guide covers the process of evading detection on Linux systems by hiding processes.

  6. Linux Red Team Defense Evasion - Rootkits : This guide covers the process of evading detection on Linux systems by leveraging rootkits.

  7. Windows Red Team Lateral Movement Techniques : This guide covers the process of performing lateral movement on Windows systems.

This page was originally published on


Your Feedback Is Important

Let us know if this guide was helpful to you.


Join the conversation.
Read other comments or post your own below. Comments must be respectful, constructive, and relevant to the topic of the guide. Do not post external links or advertisements. Before posting, consider if your comment would be better addressed by contacting our Support team or asking on our Community Site.
The Disqus commenting system for Linode Docs requires the acceptance of Functional Cookies, which allow us to analyze site usage so we can measure and improve performance. To view and create comments for this article, please update your Cookie Preferences on this website and refresh this web page. Please note: You must have JavaScript enabled in your browser.