Home Red Team OPSEC
Post
Cancel

Red Team OPSEC

Learn how to apply Operations Security (OPSEC) process for Red Teams.

THM Room https://tryhackme.com/room/opsec

TASK 1 : Introduction

Aim to memorize the five steps of the OPSEC process as we explain each one in its own task.

As a red team member, your potential adversaries are the blue team and third parties. The blue team is considered an adversary as we are attacking the systems they are hired to monitor and defend. Red vs. blue team exercises are common to help an organization understand what threats exist in a given environment and better prepare their blue team if a real malicious attack occurs. As red teamers, even though we are abiding by the law and authorized to attack systems within a defined scope, it does not change the fact that we are acting against the blue team’s objectives and trying to circumvent their security controls. The blue team wants to protect their systems, while we want to penetrate them.

The OPSEC process has five steps :

1- Identify critical information

2- Analyse threats

3- Analyse vulnerabilities

4- Assess risks

5- Apply appropriate countermeasures

No Answer

TASK 2 : Critical Information Identification

Click on View Site and follow through till you get the flag. (Please note that some browser extensions, such as NoScript, might prevent the site from loading correctly.)

OpSec Critical Infos OpSec Critical Infos

Flag Flag

Answer : THM{OPSEC_CRITICAL_INFO}

TASK 3 : Threat Analysis

Try to think of at least one adversary who is not a threat and one who is a threat.

Just read the text.

No Answer

TASK 4 : Vulnerability Analysis

Your red team uses THC-Hydra to find the password for a specific login page. Moreover, they are using the Metasploit framework on the same system as THC-Hydra. Would you consider this an OPSEC vulnerability? (Y/N)

Answer : Y

One of the red team members posts a photo of his cat every day. Would this be considered an OPSEC vulnerability? (Y/N)

Answer : N

Answer : Y

Your red team posts on its website a list of clients you regularly conduct red team exercises with. Would you consider this an OPSEC vulnerability? (Y/N)

Answer : Y

One of your red team members posted a photo of her morning coffee. Would you consider this an OPSEC vulnerability? (Y/N)

Answer : N

TASK 5 : Risk Assessment

Your red team uses THC-Hydra to find the password for a specific login page. Moreover, they are using the Metasploit framework on the same system as THC-Hydra. Knowing that your target uses a properly configured Intrusion Detection System (IDS), would you consider this vulnerability as high risk? (Y/N)

Answer : Y

TASK 6 : Countermeasures

This concludes the fifth element in the OPSEC process. Let’s get ready before we apply all five elements to other instances of critical information.

No Answer

TASK 7 : More Practical Examples

Click on View Site and follow through till you get the flag. (Please note that some browser extensions, such as NoScript, might prevent the site from loading correctly.)

There are four subquestions here :

Question 1 Question 1

Answer : 4 5 2 3 1

Question 2 Question 2

Answer : 1 5 4 3 2

Question 3 Question 3

Answer : 5 2 4 3 1

Question 4 Question 4

Answer : 2 3 1 5 4

TASK 8 : Summary

Memorise the five elements of the OPSEC process and learn how to apply them to the different aspects of your cybersecurity work.

No Answer

This post is licensed under CC BY 4.0 by the author.