Red Team Operations

Think like an adversary, act like an ally.

In today's rapidly evolving threat landscape, red teaming plays a crucial role in cybersecurity. As threats continue to advance and become more sophisticated, organizations must proactively assess their security measures. Red teaming involves testing the effectiveness of people, processes, and technology through objective-oriented assessments that simulate realistic attacker techniques. By leveraging threat intelligence and emulating real-world environments, red teams provide invaluable insights into an organization's vulnerabilities. This practice helps identify weaknesses, enhance defense strategies, and strengthen incident response capabilities. The main objective of red teaming is to make the blue team better by informing both offense and defense. By continually challenging and refining security measures, organizations can stay one step ahead of emerging threats. Through the collaborative efforts of red and blue teams, organizations can effectively mitigate risks, safeguard sensitive data, and maintain a robust security posture in the face of evolving cyber threats.

SEC565: Red Team Operations - Pivoting Workshop

Red Team Operations - Pivoting Workshop

Pivoting, tunneling, and redirection are essential skills that separate the junior and senior operators in the offensive security landscape. This workshop describes various techniques used to creatively route traffic through multiple network segments which you then practice the skills you've learned in a cyber range during and after the workshop. These are essential skills for every pentester, bug bounty hunter, and red team operator, as well as defenders learning techniques for detecting these sorts of suspicious traffic in their network.

An Intro to C for Windows Devs

An Intro to C for Windows Devs

This workshop serve is a prerequisite for those interested in taking the SEC670 course. This first part will cover basic items such as, setting up Visual Studio Community, creating a project, developing your first project, etc. We will then dive into the C programming language itself covering data types, the anatomy of a function, statements, variables, directives, and debugging.

Learn About SEC565: Red Team Operations and Adversary Emulation

SEC565: Red Team Operations and Adversary Emulation

The best defense is a strong offense. Red Team sets the pace for protecting the entire organization. SEC565 trains security professionals to take the lead. Learn how to execute repeatable Red Team engagements, with an emphasis on people, processes, and technologies to ready Blue Team defenses. Develop and improve Red Team operations by employing techniques for security controls through adversary emulation, cyber threat intelligence, Red Team tradecraft, and engagement planning.

SEC670: Red Teaming Tools - Developing Windows Implants, Shellcode, Command and Control

Malware is becoming more lethal. Red Teams must understand these increasingly complex attacks that threaten safety. SEC670 takes offensive operations to a new level. This course introduces techniques that real nation-state malware actors are deploying today. Red Teams will learn how to develop custom-compiled offensive tools through programming, APIs, and applied mitigations for techniques covering privilege escalation, persistence, and collection. This training is a must-have for cybersecurity practitioners working in the areas of Defense, Government, Critical Infrastructure, Energy and Financial Services.