0_README

Red Teaming 101: Master Index

BLUF: This series provides a structured roadmap for transitioning from traditional penetration testing to advanced red team operations using the Harada OW64 methodology.

Master OW64 Grid โ€” Harada Mandala Chart

Tip

How to read: The center goal is surrounded by 8 pillars. Click any pillar to see its 8 action items in the dedicated file. Complete all 64 items to achieve the central goal.

๐ŸŸฃ P8 ยท Reporting ๐Ÿ”ด P1 ยท Linux ๐ŸŸ  P2 ยท Windows/AD
๐Ÿ“ก P7 ยท C2 Infra ๐ŸŽฏ Become a Red Team Operator ๐ŸŒ P3 ยท Web
โšซ P6 ยท EDR ๐Ÿ”ต P5 ยท Cloud ๐ŸŸข P4 ยท Networking

Operational Overview

graph TB
    Goal((Red Team Operator))
    style Goal fill:#ff6600,stroke:#333,stroke-width:4px

    subgraph P1[Linux]
        L1[Enumeration & Phases]
        L2[SUID/SGID/Caps Exploit]
        L3[Cron & Service Abuse]
        L4[Kernel Exploit]
        L5[SSH Pivoting & Keys]
        L6[Container Escape]
        L7[Linux Persistence]
        L8[Full Linux Chain]
    end

    subgraph P2[Windows/AD]
        W1[System Enumeration]
        W2[Windows PrivEsc]
        W3[Credential Harvesting]
        W4[Windows Persistence]
        W5[AD Recon & Enum]
        W6[Kerberos Attacks]
        W7[NTLM Relay & Lateral]
        W8[ACL/ADCS/Domain Dom]
    end

    subgraph P3[Web]
        WB1[HTTP Recon & Phases]
        WB2[OWASP Top 10]
        WB3[Auth Attacks]
        WB4[API Hacking]
        WB5[SQL & Injection]
        WB6[Burp Suite Pro]
        WB7[File Upload & SSRF]
        WB8[Full Web Engagement]
    end

    subgraph P4[Network]
        N1[Post-Pivot Enum]
        N2[Quiet Port Scanning]
        N3[SOCKS w/ Chisel/rpivot]
        N4[Port Forwarding]
        N5[DNS Tunneling]
        N6[Infra Enumeration]
        N7[Full Pivot Chain]
    end

    subgraph P5[Cloud]
        CL1[Cloud Identity]
        CL2[Cloud Enum & Recon]
        CL3[IAM PrivEsc]
        CL4[Token Theft & Abuse]
        CL5[IMDS Abuse]
        CL6[Azure AD Attacks]
        CL7[Serverless & Containers]
        CL8[Full Cloud Engagement]
    end

    subgraph P6[EDR]
        E1[AV Evasion]
        E2[AMSI Bypass]
        E3[Process Injection]
        E4[ETW & Unhooking]
        E5[Syscall Evasion]
        E6[Sleep Obfusc & Stack]
        E7[EDR Bypass Method]
        E8[LOLBins & BYOVD]
    end

    subgraph P7[C2]
        C1[C2 Fundamentals & Sliver]
        C2[Cobalt Strike Basics]
        C3[Redirectors & Traffic]
        C4[SSH Tunneling for C2]
        C5[Mythic & P2P Agents]
        C6[Domain Fronting]
        C7[DNS C2 Deep Dive]
        C8[BOF Dev & Multi-C2]
        C9[Full Infra Deployment]
    end

    subgraph P8[Reporting]
        R1[Finding Documentation]
        R2[Executive Summary]
        R3[Technical Report]
        R4[Remediation Mapping]
        R5[Attack Path Docs]
        R6[Public Writeup]
        R7[Tool Repo Curation]
        R8[Full Portfolio Dev]
    end

    Goal --- P1
    Goal --- P2
    Goal --- P3
    Goal --- P4
    Goal --- P5
    Goal --- P6
    Goal --- P7
    Goal --- P8

Foundational Cheatsheets

Execution Model

Daily Micro-Practice (30โ€“60 min total):

Rotating Deep Pillar (60โ€“120 min โ€” pick one per day):

Day Focus
Monday C2 Infrastructure
Tuesday EDR Bypass / Evasion
Wednesday Networking & Pivoting
Thursday Cloud
Friday Full Attack Path Lab
Saturday Web & API
Sunday Review + Documentation

Progress Tracking

Level Criteria
[Beginner] Can perform the technique with reference material / walkthrough
[Intermediate] Can perform independently in a lab environment
[Advanced] Can adapt and apply in novel scenarios under time pressure
[Operator] Can chain techniques into complete attack paths on real engagements

Prerequisites

Before starting this series, ensure you are comfortable with the concepts in the Recon series:

# Pillar File Skill Range MITRE Focus Action Items
1 Linux 1_Linux Beginner โ†’ Operator Persistence, PrivEsc Enumeration (8 phases incl. Phase 7.5), SUID/SGID, Cron Abuse, Kernel Exploit, SSH Pivoting, Container Escape, Persistence, Full Chain
2 Windows/AD 2_Windows_AD Beginner โ†’ Operator Lateral Movement, Credential Access Enumeration (8 phases incl. Phase 7.5), PrivEsc, Cred Harvest, Persistence, AD Recon (9 phases), Kerberos, NTLM Relay, ACL/ADCS
3 Web 3_Web Beginner โ†’ Operator Initial Access, Injection HTTP Recon (4 phases incl. Phase 0), OWASP Top 10, Auth Attacks, API Hacking, SQL Injection, Burp Suite Pro, File Upload/SSRF, Full Engagement
4 Networking 4_Networking Beginner โ†’ Operator C2, Discovery, Pivoting Post-Pivot Enum, Port Scanning (4 phases incl. Phase 4), SOCKS/Chisel, Port Forwarding, DNS Tunneling, Infra Enum, Full Pivot Chain
5 Cloud 5_Cloud Beginner โ†’ Operator Initial Access, Persistence Cloud Identity, Enum/Recon, IAM PrivEsc, Token Theft, IMDS Abuse, Azure AD Attacks, Serverless/Containers, Full Cloud Engagement
6 EDR 6_EDR Beginner โ†’ Operator Defense Evasion AV Evasion, AMSI Bypass, Process Injection, ETW/Unhooking, Syscall Evasion, Sleep Obfusc/Stack Spoof, EDR Bypass Method, LOLBins/BYOVD
7 C2 Infrastructure 7_C2 Beginner โ†’ Operator Command and Control C2/Sliver (3 phases), Cobalt Strike, Redirectors, SSH C2 Tunneling (3 phases), Mythic/P2P, Domain Fronting, DNS C2, BOF Dev, Full Infra
8 Reporting 8_Reporting Beginner โ†’ Operator Operational Excellence Finding Documentation (3 phases), Exec Summary, Technical Report, Remediation Mapping, Attack Path Docs, Public Writeup, Tool Repo, Full Portfolio

Pillar Content Index

Quick-reference breakdown of what's inside each pillar file.

๐Ÿ”ด P1 โ€” Linux (1_Linux.md)

Action Item Skill Key Phases
1 โ€” System & Environment Enumeration [Beginner] Phase 1โ€“7 + Phase 7.5 (Unknown Process/Service ID)
2 โ€” SUID/SGID/Capabilities Exploitation [Beginner] โ€”
3 โ€” Cron Job & Service Abuse [Intermediate] โ€”
4 โ€” Kernel Exploit Identification & Execution [Intermediate] โ€”
5 โ€” SSH Pivoting & Key Harvesting [Intermediate] โ€”
6 โ€” Container Escape Techniques [Advanced] โ€”
7 โ€” Linux Persistence Mechanisms [Advanced] โ€”
8 โ€” Full Linux Attack Chain [Operator] โ€”

๐ŸŸ  P2 โ€” Windows/AD (2_Windows_AD.md)

Action Item Skill Key Phases
1 โ€” System & Environment Enumeration [Beginner] Phase 1โ€“7 + Phase 7.5 (Unknown Service/Binary ID)
2 โ€” Windows Privilege Escalation [Beginner/Intermediate] โ€”
3 โ€” Windows Credential Harvesting [Intermediate] โ€”
4 โ€” Windows Persistence [Intermediate] โ€”
5 โ€” Windows/AD Recon & Enumeration [Intermediate] Phase 0โ€“8 (DNS โ†’ BloodHound)
6 โ€” Kerberos Attacks [Intermediate] โ€”
7 โ€” NTLM Relay & Lateral Movement [Advanced] โ€”
8 โ€” ACL Abuse, ADCS & Domain Dominance [Advanced] โ€”

๐ŸŒ P3 โ€” Web (3_Web.md)

Action Item Skill Key Phases
1 โ€” HTTP Fundamentals & Web Recon [Beginner] Phase 0 (Unknown App First Contact), Phase 1โ€“3
2 โ€” OWASP Top 10 Exploitation [Beginner] โ€”
3 โ€” Authentication Attacks [Beginner] โ€”
4 โ€” API Hacking [Intermediate] โ€”
5 โ€” SQL Injection & Injection Attacks [Intermediate] โ€”
6 โ€” Burp Suite Pro Workflow [Intermediate] โ€”
7 โ€” File Upload & SSRF Chains [Advanced] โ€”
8 โ€” Full Web Engagement [Operator] โ€”

๐ŸŸข P4 โ€” Networking (4_Networking.md)

Action Item Skill Key Phases
1 โ€” Network Enumeration Post-Pivot [Beginner] Phase 1โ€“3 (Host Context โ†’ Service Discovery)
2 โ€” Quiet Port Scanning [Intermediate] Phase 1โ€“3 + Phase 4 (Unknown Port/Protocol ID)
3 โ€” SOCKS Proxy with Chisel & rpivot [Intermediate] โ€”
4 โ€” Port Forwarding Deep Dive [Intermediate] โ€”
5 โ€” DNS Tunneling [Intermediate] โ€”
6 โ€” Network Infrastructure Enumeration [Intermediate] Phase 1โ€“3 (CDP/LLDP โ†’ SNMP โ†’ Routing)
7 โ€” Full Network Pivot Chain [Operator] โ€”
VPN Tunneling & WireGuard Pivots [Advanced] โ€”
VLAN Hopping & Segmentation Bypass [Advanced] โ€”

๐Ÿ”ต P5 โ€” Cloud (5_Cloud.md)

Action Item Skill Key Phases
1 โ€” Cloud Identity Fundamentals [Beginner] Phase 1โ€“2 (Tenant Context, Identity Recon)
2 โ€” Cloud Enumeration & Recon [Beginner] โ€”
3 โ€” IAM Privilege Escalation [Intermediate] โ€”
4 โ€” Token Theft & Abuse [Intermediate] โ€”
5 โ€” IMDS Abuse [Intermediate] โ€”
6 โ€” Azure AD / Entra ID Attack Paths [Advanced] โ€”
7 โ€” Serverless & Container Attacks [Advanced] โ€”
8 โ€” Full Cloud Engagement [Operator] โ€”

โšซ P6 โ€” EDR (6_EDR.md)

Action Item Skill Key Phases
1 โ€” AV Evasion Fundamentals [Beginner] โ€”
2 โ€” AMSI Bypass Techniques [Beginner] โ€”
3 โ€” Process Injection Techniques [Intermediate] โ€”
4 โ€” ETW Patching & Unhooking [Intermediate] โ€”
5 โ€” Syscall-Based Evasion [Advanced] โ€”
6 โ€” Sleep Obfuscation & Stack Spoofing [Advanced] Sleep Obfuscation + Stack Spoofing
7 โ€” EDR Bypass Methodology [Advanced] โ€”
8 โ€” LOLBins, BYOVD & WDAC Bypass [Advanced] โ€”

๐Ÿ“ก P7 โ€” C2 Infrastructure (7_C2.md)

Action Item Skill Key Phases
1 โ€” C2 Fundamentals & Sliver [Beginner] Phase 1โ€“3 (Hardening โ†’ Listeners โ†’ Post-Ex)
2 โ€” Cobalt Strike Basics [Beginner] โ€”
3 โ€” Redirectors & Traffic Shaping [Intermediate] โ€”
4 โ€” SSH Tunneling for C2 Channels [Intermediate] Phase 1โ€“3 (Forwarding โ†’ Multi-Hop โ†’ TUN/TAP)
5 โ€” Mythic C2 & P2P Agents [Intermediate] โ€”
6 โ€” Domain Fronting [Intermediate] โ€”
7 โ€” DNS C2 Deep Dive [Advanced] โ€”
8 โ€” BOF Development & Multi-C2 Mgmt [Advanced] โ€”
9 โ€” Full Infrastructure Deployment [Operator] โ€”

๐ŸŸฃ P8 โ€” Reporting (8_Reporting.md)

Action Item Skill Key Phases
1 โ€” Finding Documentation [Beginner] Phase 1โ€“3 (Evidence โ†’ Triage โ†’ Write-Up)
2 โ€” Executive Summary Writing [Beginner] โ€”
3 โ€” Technical Report Writing [Intermediate] โ€”
4 โ€” Remediation Framework Mapping [Intermediate] โ€”
5 โ€” Attack Path Documentation [Intermediate] โ€”
6 โ€” Public Writeup Creation [Advanced] โ€”
7 โ€” Tool Repository Curation [Advanced] โ€”
8 โ€” Full Portfolio Development [Operator] โ€”

Portfolio Reminder

Note

Publish one technical artifact every 4โ€“6 weeks.
Examples: red team writeup, offensive tool repo, detection bypass research, attack path diagram, blog post.
Companies like Mandiant, CrowdStrike, and Microsoft hire people who demonstrate thinking, not just certifications.


Red Team 101 โ€” Operational Doctrine

BLUF: Technical skill is table stakes. What separates an operator from a hobbyist is how they plan, document, communicate, and manage risk throughout an engagement.


Pre-Ops: Planning & Authorization

Nothing executes without paper. If you don't have written authorization you are committing a crime, not running a red team engagement.

Required Before Day 1:

Document Purpose
Statement of Work (SoW) Defines scope, deliverables, timeline, cost
Rules of Engagement (RoE) What you CAN do โ€” techniques, hours, escalation process
Authorization Letter Legal protection if challenged by law enforcement
Emergency Contact List Who to call 24/7 if something breaks

RoE Must Explicitly Address:

Warning

Stay in your lane. If you find something that requires going outside agreed scope, stop and call the client. Do not exploit it. Document it. Ask.


Op Plan

Sections:

  1. Objective โ€” What does success look like? (e.g., "Achieve DA without triggering a SOC alert")
  2. Target Profile โ€” Known intel: tech stack, AV/EDR, network segmentation, users
  3. Phasing โ€” Recon โ†’ Initial Access โ†’ Post-Ex โ†’ Lateral Movement โ†’ Objectives โ†’ Reporting
  4. TTP Selection โ€” Specific techniques planned per phase, mapped to MITRE ATT&CK
  5. Contingency โ€” What happens if you get caught? How do you re-establish access?
  6. Exit Criteria โ€” When do you stop?

Infrastructure

Standard Red Team Infra Stack:

Component Purpose Examples
Jump Server / VPS Operator access point, external-facing DigitalOcean, Vultr, AWS EC2, Residential Proxy
C2 Server Beacon callbacks, session management Cobalt Strike, Sliver, Mythic
Redirectors Traffic filtering, attribution protection Nginx, Apache, Cloudflare
Operator Workstation Local machine for tooling and sessions Kali, ParrotOS, hardened VM
Training / Testing VMs Offline tool testing before deployment Local VirtualBox/VMware lab
Collaboration Team comms, task tracking Slack, Mattermost, Obsidian

Infrastructure Rules:


Workstation Hardening (Assessment Laptop)

Your laptop is the most sensitive device in the engagement. If it's compromised or stolen, the client's network is compromised too.

OS & Build:

How to:

# Enable LUKS full-disk encryption during OS install (Kali/Ubuntu installer โ€” check "Encrypt" option)
# Or encrypt an existing partition post-install:
cryptsetup luksFormat /dev/sdX
cryptsetup luksOpen /dev/sdX encrypted_vol

# Auto-lock (GNOME)
gsettings set org.gnome.desktop.session idle-delay 300
gsettings set org.gnome.desktop.screensaver lock-enabled true

# Patch before engagement
sudo apt update && sudo apt full-upgrade -y

# Disable Bluetooth
sudo systemctl disable bluetooth --now

# Disable USB auto-mount (GNOME)
gsettings set org.gnome.desktop.media-handling automount false

Compartmentalization:

How to:

# Create a new KVM/QEMU VM for the engagement (or use VirtualBox)
virt-manager  # GUI โ€” create new VM, allocate disk, take snapshot before connecting

# VirtualBox snapshot before connecting to client
VBoxManage snapshot "EngagementVM" take "pre-client-connect" --description "Clean state"

# Verify VPN is up on host BEFORE starting VM
curl ifconfig.me  # confirm you're hitting VPN exit IP, not home ISP

Network Discipline:

How to:

# Verify no split tunnel โ€” all traffic should exit VPN
ip route show   # default route should point to tun0/wg0, not eth0/wlan0

# Check for DNS leakage
cat /etc/resolv.conf          # should show VPN DNS, not home router
dig +short myip.opendns.com @resolver1.opendns.com   # verify exit IP

# Enable DNS over HTTPS (systemd-resolved)
sudo nano /etc/systemd/resolved.conf
# Set: DNS=1.1.1.1  DNSOverTLS=yes
sudo systemctl restart systemd-resolved

Credential & Key Hygiene:

How to:

# Generate a per-engagement SSH keypair
ssh-keygen -t ed25519 -C "eng-clientname-2026" -f ~/.ssh/id_eng_clientname

# Suppress shell history for the session
unset HISTFILE
# Or prefix sensitive commands with a space (requires HISTCONTROL=ignorespace in .bashrc)
export HISTCONTROL=ignorespace

# Destroy keypair at engagement close
shred -u ~/.ssh/id_eng_clientname ~/.ssh/id_eng_clientname.pub

# Wipe known_hosts entries for client hosts
ssh-keygen -R <client-ip>

Physical Security:


Risk Management

Risk-Adverse Mindset:

Attack vs. Defend Mindset:

Attack Mindset Defend Mindset Red Team Balance
"How do I get in?" "How do I detect this?" Think both simultaneously
Maximize access Minimize noise Quiet access, loud findings
Exploit everything Protect everything Exploit only what's in scope
Win Survive Complete the objective, leave cleanly

Knowledge Management

What to Capture:

Repository & Data Transfer Plan:

Caution

Never store client loot on public cloud drives, unencrypted personal devices, or any system outside the defined engagement infrastructure.


Op Notes

Op notes are your real-time log. They are the source of truth for the final report and any deconfliction.

Every Entry Must Include:

[TIMESTAMP UTC]  ACTION
Command:   <exact command run>
Target:    <IP / hostname / URL>
Result:    <exact output or summary>
Artifacts: <file dropped, service created, key used, etc.>
Screenshot: <filename or link>
Note:      <why you did this / what you expected vs got>

Op Note Discipline:


Analyst Journal (Narrative Log)

Separate from op notes โ€” a narrative account written in past tense. This is the raw material for the attack narrative in the final report.

Journal Format:

[DATE TIME UTC] โ€” Narrative sentence describing what happened and why.

Example:
[2026-03-08 14:32 UTC] โ€” Performed Kerberoasting against all SPN accounts.
Identified svc_sql with RC4 encryption. Hash cracked in 4 minutes via rockyou.txt.
Used resulting credential to authenticate to SQL01 as a domain user.

Journal vs Op Notes:

Attribute Op Notes Analyst Journal
Format Structured fields Prose narrative
Timing Real-time End of session / phase
Audience Yourself, teammates Report reader
Detail level Maximum Summarized

TTPs

Document every TTP used. This drives the MITRE ATT&CK mapping in the final report and helps the blue team build detections.

TTP Log Format:

Phase MITRE ID Technique Tool Used Target Result
Recon T1595 Active Scanning nmap 10.10.10.0/24 12 live hosts
Cred Access T1558.003 Kerberoasting Rubeus domain.local 3 hashes obtained
Lateral Move T1021.002 SMB Exec wmiexec.py 10.10.10.5 Shell as svc_sql

TTP Discipline:


Reporting Cadence

Report Frequency Audience Content
Daily Sitrep End of each op day Client POC Progress, systems accessed, blockers, next steps
Mishap Report Immediately on incident Client POC + Management What happened, impact, containment, RCA
Deficiency Report As discovered Client technical lead Critical finding needing immediate attention
Final Report End of engagement All stakeholders Executive summary, all findings, attack narrative, TTP log, remediation

Daily Sitrep Template:

Date:             [DATE]
Operator:         [NAME]
Objective Today:  [WHAT YOU PLANNED]
Accomplished:     [WHAT YOU DID]
Systems Accessed: [IP / HOSTNAME LIST]
Findings:         [NEW FINDINGS SUMMARY]
Blockers:         [ANYTHING STOPPING PROGRESS]
Plan Tomorrow:    [NEXT STEPS]
Risk Items:       [ANYTHING NEEDING CLIENT ATTENTION]

Mishap Report Triggers โ€” Stop and report immediately if you:


Post-Engagement Debrief

Cleanup Checklist:

Debrief Meeting Agenda:

  1. Walk the client through the attack narrative โ€” show the path, not just the findings
  2. Demonstrate key findings with live reproduction (if safe)
  3. Map each finding to a defensive control that would have blocked or detected it
  4. Discuss detection gaps identified from the TTP log
  5. Agree on a remediation timeline