0_README

Red Teaming 101: Master Index

BLUF: This series provides a structured roadmap for transitioning from traditional penetration testing to advanced red team operations using the Harada OW64 methodology.

Master OW64 Grid โ€” Harada Mandala Chart

Tip

How to read: The center goal is surrounded by 8 pillars. Click any pillar to see its 8 action items in the dedicated file. Complete all 64 items to achieve the central goal.

๐ŸŸฃ P8 ยท Reporting ๐Ÿ”ด P1 ยท Linux ๐ŸŸ  P2 ยท Windows/AD
๐Ÿ“ก P7 ยท C2 Infra ๐ŸŽฏ Become a Red Team Operator ๐ŸŒ P3 ยท Web
โšซ P6 ยท EDR ๐Ÿ”ต P5 ยท Cloud ๐ŸŸข P4 ยท Networking

Operational Overview

graph TB
    Goal((Red Team Operator))
    style Goal fill:#ff6600,stroke:#333,stroke-width:4px

    subgraph P1[Linux]
        L1[Enumeration]
        L2[PrivEsc]
        L3[Persistence]
    end

    subgraph P2[Windows/AD]
        W1[BloodHound]
        W2[Kerberoasting]
        W3[Trusts]
    end

    subgraph P3[Web]
        WB1[Recon & Enum]
        WB2[Injection & Auth]
        WB3[API & SSRF]
    end

    subgraph P4[Network]
        N1[Tunneling]
        N2[Pivoting]
        N3[Segmentation]
    end

    subgraph P5[Cloud]
        CL1[IAM/Identity]
        CL2[Azure/AWS]
        CL3[Serverless]
    end

    subgraph P6[EDR]
        E1[AV/AMSI]
        E2[ETW/Unhooking]
        E3[Syscalls]
    end

    subgraph P7[C2]
        C1[Frameworks]
        C2[Redirectors]
        C3[Covert Channels]
    end

    subgraph P8[Reporting]
        R1[Technical]
        R2[Executive]
        R3[Portfolio]
    end

    Goal --- P1
    Goal --- P2
    Goal --- P3
    Goal --- P4
    Goal --- P5
    Goal --- P6
    Goal --- P7
    Goal --- P8

Execution Model

Daily Micro-Practice (30โ€“60 min total):

Rotating Deep Pillar (60โ€“120 min โ€” pick one per day):

Day Focus
Monday C2 Infrastructure
Tuesday EDR Bypass / Evasion
Wednesday Networking & Pivoting
Thursday Cloud
Friday Full Attack Path Lab
Saturday Web & API
Sunday Review + Documentation

Progress Tracking

Level Criteria
[Beginner] Can perform the technique with reference material / walkthrough
[Intermediate] Can perform independently in a lab environment
[Advanced] Can adapt and apply in novel scenarios under time pressure
[Operator] Can chain techniques into complete attack paths on real engagements

Prerequisites

Before starting this series, ensure you are comfortable with the concepts in the Recon series:

# Pillar File MITRE Focus
1 Linux 1_Linux Persistence, PrivEsc
2 Windows/AD 2_Windows_AD Lateral Movement, Credential Access
3 Web 3_Web Initial Access, Injection
4 Networking 4_Networking C2, Discovery, Pivoting
5 Cloud 5_Cloud Initial Access, Persistence
6 EDR 6_EDR Defense Evasion
7 C2 Infrastructure 7_C2 Command and Control
8 Reporting 8_Reporting Operational Excellence

AI Usage

Good uses:

Bad uses (avoid):

Career Progression

Aspect Pentester Red Team Operator
Scope Find vulnerabilities (point-in-time) Test detection & response (adversarial simulation)
Stealth Loud โ€” maximize coverage Quiet โ€” OPSEC first
Tools Use what works Build what's needed
Persistence Get DA and leave Maintain access for weeks/months
Reporting Technical findings Business impact + detection gaps

What Elite Firms Look For :

Portfolio Reminder

Note

Publish one technical artifact every 4โ€“6 weeks.
Examples: red team writeup, offensive tool repo, detection bypass research, attack path diagram, blog post.
Companies like Mandiant, CrowdStrike, and Microsoft hire people who demonstrate thinking, not just certifications.


Red Team 101 โ€” Operational Doctrine

BLUF: Technical skill is table stakes. What separates an operator from a hobbyist is how they plan, document, communicate, and manage risk throughout an engagement.


Pre-Ops: Planning & Authorization

Nothing executes without paper. If you don't have written authorization you are committing a crime, not running a red team engagement.

Required Before Day 1:

Document Purpose
Statement of Work (SoW) Defines scope, deliverables, timeline, cost
Rules of Engagement (RoE) What you CAN do โ€” techniques, hours, escalation process
Authorization Letter Legal protection if challenged by law enforcement
Emergency Contact List Who to call 24/7 if something breaks

RoE Must Explicitly Address:

Warning

Stay in your lane. If you find something that requires going outside agreed scope, stop and call the client. Do not exploit it. Document it. Ask.


Op Plan

Sections:

  1. Objective โ€” What does success look like? (e.g., "Achieve DA without triggering a SOC alert")
  2. Target Profile โ€” Known intel: tech stack, AV/EDR, network segmentation, users
  3. Phasing โ€” Recon โ†’ Initial Access โ†’ Post-Ex โ†’ Lateral Movement โ†’ Objectives โ†’ Reporting
  4. TTP Selection โ€” Specific techniques planned per phase, mapped to MITRE ATT&CK
  5. Contingency โ€” What happens if you get caught? How do you re-establish access?
  6. Exit Criteria โ€” When do you stop?

Infrastructure

Standard Red Team Infra Stack:

Component Purpose Examples
Jump Server / VPS Operator access point, external-facing DigitalOcean, Vultr, AWS EC2, Residential Proxy
C2 Server Beacon callbacks, session management Cobalt Strike, Sliver, Mythic
Redirectors Traffic filtering, attribution protection Nginx, Apache, Cloudflare
Operator Workstation Local machine for tooling and sessions Kali, ParrotOS, hardened VM
Training / Testing VMs Offline tool testing before deployment Local VirtualBox/VMware lab
Collaboration Team comms, task tracking Slack, Mattermost, Obsidian

Infrastructure Rules:


Workstation Hardening (Assessment Laptop)

Your laptop is the most sensitive device in the engagement. If it's compromised or stolen, the client's network is compromised too.

OS & Build:

How to:

# Enable LUKS full-disk encryption during OS install (Kali/Ubuntu installer โ€” check "Encrypt" option)
# Or encrypt an existing partition post-install:
cryptsetup luksFormat /dev/sdX
cryptsetup luksOpen /dev/sdX encrypted_vol

# Auto-lock (GNOME)
gsettings set org.gnome.desktop.session idle-delay 300
gsettings set org.gnome.desktop.screensaver lock-enabled true

# Patch before engagement
sudo apt update && sudo apt full-upgrade -y

# Disable Bluetooth
sudo systemctl disable bluetooth --now

# Disable USB auto-mount (GNOME)
gsettings set org.gnome.desktop.media-handling automount false

Compartmentalization:

How to:

# Create a new KVM/QEMU VM for the engagement (or use VirtualBox)
virt-manager  # GUI โ€” create new VM, allocate disk, take snapshot before connecting

# VirtualBox snapshot before connecting to client
VBoxManage snapshot "EngagementVM" take "pre-client-connect" --description "Clean state"

# Verify VPN is up on host BEFORE starting VM
curl ifconfig.me  # confirm you're hitting VPN exit IP, not home ISP

Network Discipline:

How to:

# Verify no split tunnel โ€” all traffic should exit VPN
ip route show   # default route should point to tun0/wg0, not eth0/wlan0

# Check for DNS leakage
cat /etc/resolv.conf          # should show VPN DNS, not home router
dig +short myip.opendns.com @resolver1.opendns.com   # verify exit IP

# Enable DNS over HTTPS (systemd-resolved)
sudo nano /etc/systemd/resolved.conf
# Set: DNS=1.1.1.1  DNSOverTLS=yes
sudo systemctl restart systemd-resolved

Credential & Key Hygiene:

How to:

# Generate a per-engagement SSH keypair
ssh-keygen -t ed25519 -C "eng-clientname-2026" -f ~/.ssh/id_eng_clientname

# Suppress shell history for the session
unset HISTFILE
# Or prefix sensitive commands with a space (requires HISTCONTROL=ignorespace in .bashrc)
export HISTCONTROL=ignorespace

# Destroy keypair at engagement close
shred -u ~/.ssh/id_eng_clientname ~/.ssh/id_eng_clientname.pub

# Wipe known_hosts entries for client hosts
ssh-keygen -R <client-ip>

Physical Security:


Risk Management

Risk-Adverse Mindset:

Attack vs. Defend Mindset:

Attack Mindset Defend Mindset Red Team Balance
"How do I get in?" "How do I detect this?" Think both simultaneously
Maximize access Minimize noise Quiet access, loud findings
Exploit everything Protect everything Exploit only what's in scope
Win Survive Complete the objective, leave cleanly

Knowledge Management

What to Capture:

Repository & Data Transfer Plan:

Caution

Never store client loot on public cloud drives, unencrypted personal devices, or any system outside the defined engagement infrastructure.


Op Notes

Op notes are your real-time log. They are the source of truth for the final report and any deconfliction.

Every Entry Must Include:

[TIMESTAMP UTC]  ACTION
Command:   <exact command run>
Target:    <IP / hostname / URL>
Result:    <exact output or summary>
Artifacts: <file dropped, service created, key used, etc.>
Screenshot: <filename or link>
Note:      <why you did this / what you expected vs got>

Op Note Discipline:


Analyst Journal (Narrative Log)

Separate from op notes โ€” a narrative account written in past tense. This is the raw material for the attack narrative in the final report.

Journal Format:

[DATE TIME UTC] โ€” Narrative sentence describing what happened and why.

Example:
[2026-03-08 14:32 UTC] โ€” Performed Kerberoasting against all SPN accounts.
Identified svc_sql with RC4 encryption. Hash cracked in 4 minutes via rockyou.txt.
Used resulting credential to authenticate to SQL01 as a domain user.

Journal vs Op Notes:

Attribute Op Notes Analyst Journal
Format Structured fields Prose narrative
Timing Real-time End of session / phase
Audience Yourself, teammates Report reader
Detail level Maximum Summarized

TTPs

Document every TTP used. This drives the MITRE ATT&CK mapping in the final report and helps the blue team build detections.

TTP Log Format:

Phase MITRE ID Technique Tool Used Target Result
Recon T1595 Active Scanning nmap 10.10.10.0/24 12 live hosts
Cred Access T1558.003 Kerberoasting Rubeus domain.local 3 hashes obtained
Lateral Move T1021.002 SMB Exec wmiexec.py 10.10.10.5 Shell as svc_sql

TTP Discipline:


Reporting Cadence

Report Frequency Audience Content
Daily Sitrep End of each op day Client POC Progress, systems accessed, blockers, next steps
Mishap Report Immediately on incident Client POC + Management What happened, impact, containment, RCA
Deficiency Report As discovered Client technical lead Critical finding needing immediate attention
Final Report End of engagement All stakeholders Executive summary, all findings, attack narrative, TTP log, remediation

Daily Sitrep Template:

Date:             [DATE]
Operator:         [NAME]
Objective Today:  [WHAT YOU PLANNED]
Accomplished:     [WHAT YOU DID]
Systems Accessed: [IP / HOSTNAME LIST]
Findings:         [NEW FINDINGS SUMMARY]
Blockers:         [ANYTHING STOPPING PROGRESS]
Plan Tomorrow:    [NEXT STEPS]
Risk Items:       [ANYTHING NEEDING CLIENT ATTENTION]

Mishap Report Triggers โ€” Stop and report immediately if you:


Post-Engagement Debrief

Cleanup Checklist:

Debrief Meeting Agenda:

  1. Walk the client through the attack narrative โ€” show the path, not just the findings
  2. Demonstrate key findings with live reproduction (if safe)
  3. Map each finding to a defensive control that would have blocked or detected it
  4. Discuss detection gaps identified from the TTP log
  5. Agree on a remediation timeline