So You Want to Learn [Red] Teaming?

Red Teaming is something that takes a bit of experience to actually nail, it's not something you expect to walk into after doing a four year uni course or something to pick up with little to no actual security experience....

2 months ago

Latest Post Focus RS 2016 - Some Light Aesthetic Car Hacking by Andy Gill

Red Teaming or Simulated Attacks, both used interchangeably are terms being thrown around a lot recently.  It's something I've been learning about over the last year and I've come to the conclusion that there's not much out there that actually explains the process or a path to actually learn what to do. There are lots of articles that explain the differences between red and blue but few actually outline a learning path for someone wanting to transition from standard penetration testing to red team operations.

Before we dive in, it is important to understand that there are lots of excellent red teamers out there who produce amazing tools, write-ups and talks. I am always learning and therefore if anything is wrong in this article please let me know and I'll update and fix.

Red Teaming is something that takes a bit of experience to actually nail. It's not something you expect to walk into after doing a four year uni course or something to pick up with little to no actual security experience.  It requires an in depth understanding of enterprise environments, defensive practices/operations and how organisations are structured. It is also important to note that it is not all 100% hardcore technical, there is a lot of risk and organisational understanding that is required too.

As it is an operation it also requires a degree of organisation and project management. The phrase red teaming is drawn from a military standpoint and follows a simulation of credible threats.

TL;DR What is Red Teaming?

A red team engagement is a objective-based assessment that requires a holistic view of the organisation from the perspective of an adversary. This assessment process is designed to meet the needs of complex organisations handling a variety of sensitive assets through technical, physical, or process-based means.

The purpose of carrying out a red team assessment is to demonstrate how real world attackers can combine exploits and tactics to achieve their goal. It is an effective way to show that even the most sophisticated technology in the world means very little if an attacker can walk out of the data centre with an un-encrypted hard drive. Instead of relying on a single network appliance to secure sensitive data, it’s better to take a defence in depth approach and continuously improve your people, process, and technology.

Red Teams are brought in by mature organisations to assess their blue team to ensure that, should a real world attack occur, the defensive capabilities are sufficiently tested and prepared.

How Does it Differ from Pentesting?

It differs in may ways, whereby usually the scope is much larger; including physical and social engineering aspects. They also are usually much more covert than pentests; as an attacker is trying to be stealthy(understanding how operational security works and how to be stealthy is useful and key to emulating threats) and hide their tracks on the target network, the red team should opt to emulate this.

It also follows an attack and defend methodology whereby the team emulating an attacker(red team) is there to outline attack paths and better educate the defensive team (blue team) should a real attack occur. Red teams test full stacks of processes, people and technology and are much more than just vulnerability assessments/penetration tests.

Daniel Miessler put it perfectly; Red Teams are most often confused with penetration testers, but while they have tremendous overlap in skills and function, they are not the same.

Making Waves to Learn Red Teaming Techniques

Now that I've tried to explain the differences, how it works and why it's important you are probably thinking what is next, how do I learn the dark arts? As discussed in the intro there are a few areas of understanding that are fundamental. It is important to note that the sections below are not all encompassing and are only the tip of the iceberg when it comes to learning red teaming.

0x01: Common Phrases & Acronyms

It is important to nail down a few common phrases and acronyms that are used;

0x02: Windows Enterprise Networks

Starting nice and simple, you will want to start looking at windows networks and how domains are set up. Having a fundamental understanding of active directory is an excellent start; why not setup your own domain and understand how networks are built? Neil Lines(@myexploit2600) has a great post on creating an active directory environment and a domain setup, this can be found on his blog here.

Some of the experience around networks cannot be gained in a heartbeat unfortunately as it needs to be built up from seeing different set ups. So, following on from building your own you'll want to look at how others are set up. This can be achieved in several ways. First and foremost would be to do internal infrastructure penetration testing to see clients' networks and how they are glued together.

If you don't have the opportunity to see bigger networks as part of a day job, there are lab environments around that do somewhat emulate an enterprise network with scripted users. However I will say that some of these set ups are not aimed at new folks starting out as they can be quite challenging.

To get a better feel for how active directory and windows security operates, it is worth checking out Directory Ranger on twitter. When it comes to learning offensive techniques too it is just as important to understand how those environments are built and defended. As a red teamer you need to have an understanding of building, defending and breaking to be more effective.

If you are interested in cutting your teeth on pre-built environments it is worth checking out hack the box(https://www.hackthebox.eu/) pro labs. At the time of writing there is Offshore and Rastalabs both paid for on a monthly basis ~£90/Month.  There is also the windows red team lab by pentester academy; https://www.pentesteracademy.com/redteamlab I've not done this personally but have heard mixed reviews!

0x03: Operational Security

Operational Security, often referred to as OpSec originated in the military. The military leveraged opsec to identify, classify and protect information that can be exploited by opponents and used to collect critical info about a certain mission, organisation or an individual.

Opsec is both a strategic and analytical process used in all areas and elements of security. One of the main objectives of OpSec is to observe the data you want to protect from the angle of an opponent, just as it’s done by red teams.

The primary objective of cyber security is to protect yourself and your business against  organised crime groups(OCGs), hackers, or anyone who attempts to obtain data that can be used to reveal sensitive information. OpSec is there to put you one step closer to that goal.

In a modern day of social media it is even easier to collect information about a company or individual using minimal effort. It can be done in only a few hours of good targeting and intel gathering.

Gathering intelligence about organisations is also easy for the experienced attacker. Targeting, gathering and analysing publicly available data is mostly done with  open source intelligence tooling.

With minimal effort, it is possible to identify IP addresses, domain names, servers, technology in use and much more about an organisation. With all this data in the wrong hands, there is high potential for serious damage. This is the very reason why  constant work with data, monitoring its transfer, and looking at it through the eyes of an attacker, will place you one step ahead of the threats, and one step closer to a better security system altogether.

0x04: MITRE ATT&CK

Mitre's Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) is a  knowledge base with information about offensive actors behaviour, it outlines the different parts of an attack cycle and tactics, techniques and procedures leveraged by different adversaries.

Attackers will use thousands of different entry methods via malware, Trojans, back doors and the rest. However, once they have access to a network, most exhibit a lot of common behaviors. They learn about their  surroundings and  the environment they're in, gather credentials for legitimate users and accounts, and move to other systems in the network to steal information or set up some longer-term operation or effect.

ATT&CK is a widely known about and understood matrix for mapping attacks and emulating threats, therefore it is important for those learning the dark arts to understand the different techniques used and how to replicate and emulate them.

0x05: Reconnaissance

Alongside understanding TTPs it is just as important when starting out, to understand the process of recon. Having the ability to identify points of interest and add them into potential attack paths is a key skill to learn. Red team engagements typically are led by threat intelligence. However, to make waves into learning, it is worth looking into open source intelligence techniques before diving head first into cyber threat intelligence(CTI). While CTI is an important step pre-engagement, not all clients want full TI, some are more interested in black box approaches.

This is where learning the skills of recon can come into their own, being able to identify resources, domains, IP ranges, documents, individuals, technologies and everything in-between.  There are so many write-ups about OSINT and bug bounty recon and both are directly applicable for asset identification for red teams. It is worth checking out intel techniques for OSINT tooling and information.

Further Reading about RT

There are many more resources out there for red teaming however the above should give you the first steps to get you hungry to learn more. Stay tuned for more content around red teaming and upcoming posts around defense too!

Andy Gill

Published 2 months ago

ZeroSec - Adventures In Information Security © 2019.