Get the FREE Ultimate OpenClaw Setup Guide →

red-team-tactics

Scanned
npx machina-cli add skill vudovn/antigravity-kit/red-team-tactics --openclaw
Files (1)
SKILL.md
4.3 KB

Red Team Tactics

Adversary simulation principles based on MITRE ATT&CK framework.


1. MITRE ATT&CK Phases

Attack Lifecycle

RECONNAISSANCE → INITIAL ACCESS → EXECUTION → PERSISTENCE
       ↓              ↓              ↓            ↓
   PRIVILEGE ESC → DEFENSE EVASION → CRED ACCESS → DISCOVERY
       ↓              ↓              ↓            ↓
LATERAL MOVEMENT → COLLECTION → C2 → EXFILTRATION → IMPACT

Phase Objectives

PhaseObjective
ReconMap attack surface
Initial AccessGet first foothold
ExecutionRun code on target
PersistenceSurvive reboots
Privilege EscalationGet admin/root
Defense EvasionAvoid detection
Credential AccessHarvest credentials
DiscoveryMap internal network
Lateral MovementSpread to other systems
CollectionGather target data
C2Maintain command channel
ExfiltrationExtract data

2. Reconnaissance Principles

Passive vs Active

TypeTrade-off
PassiveNo target contact, limited info
ActiveDirect contact, more detection risk

Information Targets

CategoryValue
Technology stackAttack vector selection
Employee infoSocial engineering
Network rangesScanning scope
Third partiesSupply chain attack

3. Initial Access Vectors

Selection Criteria

VectorWhen to Use
PhishingHuman target, email access
Public exploitsVulnerable services exposed
Valid credentialsLeaked or cracked
Supply chainThird-party access

4. Privilege Escalation Principles

Windows Targets

CheckOpportunity
Unquoted service pathsWrite to path
Weak service permissionsModify service
Token privilegesAbuse SeDebug, etc.
Stored credentialsHarvest

Linux Targets

CheckOpportunity
SUID binariesExecute as owner
Sudo misconfigurationCommand execution
Kernel vulnerabilitiesKernel exploits
Cron jobsWritable scripts

5. Defense Evasion Principles

Key Techniques

TechniquePurpose
LOLBinsUse legitimate tools
ObfuscationHide malicious code
TimestompingHide file modifications
Log clearingRemove evidence

Operational Security

  • Work during business hours
  • Mimic legitimate traffic patterns
  • Use encrypted channels
  • Blend with normal behavior

6. Lateral Movement Principles

Credential Types

TypeUse
PasswordStandard auth
HashPass-the-hash
TicketPass-the-ticket
CertificateCertificate auth

Movement Paths

  • Admin shares
  • Remote services (RDP, SSH, WinRM)
  • Exploitation of internal services

7. Active Directory Attacks

Attack Categories

AttackTarget
KerberoastingService account passwords
AS-REP RoastingAccounts without pre-auth
DCSyncDomain credentials
Golden TicketPersistent domain access

8. Reporting Principles

Attack Narrative

Document the full attack chain:

  1. How initial access was gained
  2. What techniques were used
  3. What objectives were achieved
  4. Where detection failed

Detection Gaps

For each successful technique:

  • What should have detected it?
  • Why didn't detection work?
  • How to improve detection

9. Ethical Boundaries

Always

  • Stay within scope
  • Minimize impact
  • Report immediately if real threat found
  • Document all actions

Never

  • Destroy production data
  • Cause denial of service (unless scoped)
  • Access beyond proof of concept
  • Retain sensitive data

10. Anti-Patterns

❌ Don't✅ Do
Rush to exploitationFollow methodology
Cause damageMinimize impact
Skip reportingDocument everything
Ignore scopeStay within boundaries

Remember: Red team simulates attackers to improve defenses, not to cause harm.

Source

git clone https://github.com/vudovn/antigravity-kit/blob/main/.agent/skills/red-team-tactics/SKILL.mdView on GitHub

Overview

Red team tactics principles rooted in the MITRE ATT&CK framework guide adversary simulations across the full attack lifecycle, including detection evasion and reporting. It helps security teams map attacker objectives, test defenses, and produce actionable improvement plans.

How This Skill Works

The skill maps MITRE ATT&CK phases to practical tests: plan reconnaissance, choose initial access vectors (phishing, public exploits, or valid credentials), and execute through execution, persistence, privilege escalation, defense evasion, and lateral movement. It emphasizes documenting each technique, expected detections, and gaps in reporting to drive improvements in detection and response.

When to Use It

  • Plan a controlled red-team exercise to test defenses end-to-end against the full ATT&CK lifecycle.
  • Evaluate detection coverage for MITRE ATT&CK techniques and identify coverage gaps.
  • Map an organization’s attack surface using Reconnaissance and Initial Access vectors (phishing, exposed services, or credential reuse).
  • Demonstrate privilege escalation, lateral movement, and credential access in a safe test environment.
  • Produce an attack narrative and detection-gap analysis to inform remediation and SOC playbooks.

Quick Start

  1. Step 1: Define scope, objectives, and safe testing environment with stakeholders.
  2. Step 2: Map planned activities to MITRE ATT&CK phases and select initial access vectors.
  3. Step 3: Execute ethically, document techniques and detections, then prepare a remediation-focused report.

Best Practices

  • Define scope, rules of engagement, data handling, and blast radius before starting.
  • Align activities with MITRE ATT&CK phases to ensure comprehensive coverage of techniques.
  • Prioritize high-impact techniques while minimizing production impact and user disruption.
  • Thoroughly document each technique, detections observed (or not), and remediation recommendations.
  • Bridge into reporting with a clear narrative and actionable next steps for defenders.

Example Use Cases

  • Phishing-based initial access test to evaluate user awareness and email security controls.
  • Assessment of public-facing services to identify exposed attack surfaces and misconfigurations.
  • Credential extraction scenarios (valid credentials or pass-the-hash) to test internal access controls.
  • Active Directory attacks such as Kerberoasting, AS-REP Roasting, or Golden Ticket simulations.
  • Lateral movement using admin shares and remote services to assess network segmentation and monitoring.

Frequently Asked Questions

Add this skill to your agents
Sponsor this space

Reach thousands of developers