1 of 16

Red Teaming 101:

A Practical Guide to Offensive Security

2 of 16

Who Am I

    • Certified Ethical Hacker
    • Certified AppSec Penetration Tester
    • Cybersecurity Instructor
    • CTO at Hackersdaddy
    • CTF Content Creator

3 of 16

What is Red Teaming?

A Red Team is a group of ethical hackers who simulate real-world attacks on a company's network to identify vulnerabilities and improve security. They use various techniques to breach defenses and steal data, helping organizations strengthen their security posture.

4 of 16

5 of 16

Penetration Testing

Scope: Focused on specific systems or networks.

Surprise Factor: Often known to the organization beforehand.

Goal: Identify and document vulnerabilities.

Timeframe: Typically shorter, time-bound engagements.

Methodology: Follows a structured approach.

6 of 16

Red Teaming

Scope: Simulates real-world attacks against the entire organization.

Surprise Factor: Often conducted stealthily, surprising the organization.

Goal: Test the organization's overall security posture and response capabilities.

Timeframe: Can be longer, extending over weeks or even months.

Methodology: More flexible and adaptive, mimicking real-world attacker tactics.

7 of 16

Know the importance!!!

8 of 16

https://attack.mitre.org/

9 of 16

Okay! Let's get our hands dirty now...

10 of 16

Do It Accordingly

    • Basic Scan
    • Service Version Scan
    • Scanning with nmap scripts
    • Validate by interacting with each port manually
    • Perform your attack

11 of 16

Samples from session

hydra -l testuser -P /usr/share/wordlists/rockyou.txt 13.126.151.70 mysql

12 of 16

Samples from session

Interact with the mysql remotely

13 of 16

Samples from session

Getting web users details

What to do next?

Try to crack the hash, or brute force with the common wordlists to access the johnny user account and move on with the steps explained in the session

14 of 16

Still, Do You Need A Conclusion.......?

15 of 16

Contact Me

https://hackersdaddy.com/invincible

https://www.linkedin.com/in/raj-kumar-mullapudi/

rajkumar@hackersdaddy.com

16 of 16

Bring the hacker in you

Hacking is not about getting someone’s IP Address, It is all about compromizing an entire organization using an IP.

- Signing Off

Invincible