Learn about the basics of a red engagement, the main components and stakeholders involved, and how red teaming differs from other cyber security engagements.
THM Room https://tryhackme.com/room/redteamfundamentals
TASK 1 : Introduction
Click to continue to the next task
No Answer
TASK 2 : Vulnerability Assessment and Penetration Tests Limitations
Would vulnerability assessments prepare us to detect a real attacker on our networks? (Yay/Nay)
Answer : NAY
During a penetration test, are you concerned about being detected by the client? (Yay/Nay)
Answer: NAY
Highly organised groups of skilled attackers are nowadays referred to as …
Answer : Advanced Persistent Threats
TASK 3 : Red Team Engagements
The goals of a red team engagement will often be referred to as flags or…
Answer : crown jewels
During a red team engagement, common methods used by attackers are emulated against the target. Such methods are usually called TTPs. What does TTP stand for?
Answer : Tactics, Techniques and Procedures
The main objective of a red team engagement is to detect as many vulnerabilities in as many hosts as possible (Yay/Nay)
Answer : Nay
TASK 4 : Teams and Functions of an Engagement
What cell is responsible for the offensive operations of an engagement?
Answer : red cell
What cell is the trusted agent considered part of?
Answer : white cell
TASK 5 : Engagement Structure
If an adversary deployed Mimikatz on a target machine, where would they be placed in the Lockheed Martin cyber kill chain?
Answer : Installation
What technique’s purpose is to exploit the target’s system to execute code?
Answer : Exploitation
TASK 6 : Overview of a Red Team Engagement
Click the “View Site” button and follow the example engagement to get the flag
Answer : THM{RED_TEAM_ROCKS}
TASK 7 : Conclusion
Read the above and continue learning!
No Answer.