This curriculum spans the full lifecycle of enterprise red team operations, comparable to a multi-phase advisory engagement that integrates with existing security programs, from scoping and adversary emulation to reporting and governance, while addressing technical, operational, and ethical dimensions across complex organizational environments.
Module 1: Foundations of Red Teaming in Enterprise Security
- Selecting engagement scope based on regulatory mandates (e.g., PCI DSS, HIPAA) versus business-critical systems not covered by compliance frameworks.
- Defining rules of engagement that balance operational risk with the need for realistic attack simulation, including approval for credential theft or lateral movement.
- Establishing communication protocols for incident escalation during red team operations to prevent unintended service disruption.
- Determining whether to use internal red teams, external consultants, or hybrid models based on organizational trust, skill availability, and conflict of interest.
- Documenting pre-engagement legal authorizations, including liability waivers and data handling agreements for sensitive information accessed during testing.
- Integrating red team objectives with existing blue team capabilities to ensure findings are actionable and not redundant with routine vulnerability scanning.
Module 2: Threat Modeling and Adversary Emulation
- Choosing adversary frameworks (e.g., MITRE ATT&CK) to guide emulation based on the organization’s threat landscape, such as APT29 for nation-state scenarios.
- Mapping internal assets to likely attacker objectives, such as targeting domain controllers in hybrid cloud environments with federated identity systems.
- Deciding when to simulate custom malware versus using legitimate tools like PowerShell or PsExec to reflect living-off-the-land tactics.
- Adjusting emulation fidelity based on detection sensitivity—e.g., throttling beaconing frequency to avoid overwhelming SIEM alert thresholds.
- Validating threat models against recent incident data from ISACs or internal IR reports to ensure relevance to current attack patterns.
- Coordinating with threat intelligence teams to align red team scenarios with observed TTPs affecting peer organizations in the sector.
Module 3: Reconnaissance and Initial Access Techniques
- Conducting passive reconnaissance using OSINT tools (e.g., Shodan, Hunter.io) without triggering external monitoring or alerting.
- Assessing the risk of active scanning against external assets, including potential impact on WAF rate limits or DDoS protection triggers.
- Developing phishing lures tailored to corporate culture, such as mimicking internal IT service requests or executive communications.
- Testing supply chain vulnerabilities by targeting third-party vendors with weaker security postures that have network access.
- Evaluating the effectiveness of public-facing authentication mechanisms, including MFA bypass attempts via session cookie theft.
- Using physical social engineering tactics, such as tailgating or badge cloning, in coordination with facility management to avoid security breaches.
Module 4: Lateral Movement and Privilege Escalation
- Identifying high-value accounts (HVAs) and mapping group policy memberships to plan privilege escalation paths.
- Executing Kerberoasting or Golden Ticket attacks in Active Directory environments with documented recovery procedures in case of DC instability.
- Assessing the feasibility of exploiting unquoted service paths or weak registry permissions on Windows servers.
- Using credential dumping tools like Mimikatz only on isolated systems to prevent unintended credential exposure or replication conflicts.
- Navigating segmented networks by evaluating firewall rules and identifying misconfigured cross-zone trusts or overly permissive ACLs.
- Documenting lateral movement paths that bypass EDR solutions due to exclusions or insufficient telemetry coverage on legacy systems.
Module 5: Persistence and Evasion Strategies
- Deploying scheduled tasks or WMI event subscriptions that mimic legitimate administrative workflows to avoid detection.
- Testing fileless persistence mechanisms, such as PowerShell in memory payloads, and assessing detection coverage across endpoints.
- Modifying legitimate services to load malicious DLLs, ensuring changes are reversible and do not disrupt service operations.
- Evading behavioral analytics by introducing delays between actions and randomizing command sequences to break pattern recognition.
- Using encrypted C2 channels over allowed protocols (e.g., HTTPS, DNS) and measuring success against proxy and DLP inspection rules.
- Removing forensic artifacts post-engagement, including event log entries, prefetch files, and shim caches, to simulate advanced cleanup.
Module 6: Exfiltration and Data Targeting
- Identifying repositories containing sensitive data (e.g., HR databases, source code repos) using automated discovery tools and access reviews.
- Simulating data exfiltration via permitted channels such as cloud sync services or encrypted email to test DLP policy enforcement.
- Compressing and staging data in temporary directories with obfuscated filenames to evaluate endpoint monitoring effectiveness.
- Measuring the time-to-detection for large data transfers across network boundaries using NetFlow and SIEM correlation rules.
- Testing data masking and tokenization controls by attempting to retrieve original values from application outputs or logs.
- Coordinating exfiltration simulations during business hours to assess anomaly detection under normal traffic load.
Module 7: Reporting, Remediation, and Integration with Defenses
- Producing technical findings with reproducible steps, including timestamps, command-line inputs, and affected system identifiers.
- Prioritizing findings based on exploitability, business impact, and existing compensating controls rather than CVSS scores alone.
- Collaborating with blue teams to validate detection gaps and refine SOAR playbooks based on red team observations.
- Tracking remediation progress through ticketing systems and retesting critical vulnerabilities within defined SLAs.
- Conducting tabletop debriefs with stakeholders to communicate risk context without disclosing sensitive exploit details.
- Updating organizational runbooks to include red team insights on attacker dwell time, evasion techniques, and detection blind spots.
Module 8: Governance, Ethics, and Program Sustainability
- Establishing an independent review board to approve high-risk red team activities, such as domain controller exploitation or cloud API abuse.
- Defining data retention policies for red team artifacts, including logs, screenshots, and credential records, in alignment with privacy laws.
- Rotating red team personnel to prevent predictability and introduce fresh adversarial perspectives over time.
- Measuring program effectiveness using metrics like mean time to detect (MTTD) and mean time to respond (MTTR) pre- and post-engagement.
- Ensuring red team tools and techniques are updated quarterly to reflect emerging threats and technology changes (e.g., SaaS adoption).
- Managing conflict between red team objectives and operational stability by instituting change advisory boards for high-impact tests.