Attack Trees
To start off in the red team as someone without hacking experience, we recommend following a story of a small grove in the forest first. The red team tries out all kinds of details of the forest.
Grove
Reconnaissance
Scanning
Enumeration
Database
- Introduction
- Access password database
- Cracking the database root password
- Using known database exploits
- SQL injection
- Confirm SQL injection vulnerability
- SQL injection login bypass
- Extracting data from the database
- Read and write local files outside of www root
- Get shell and control target server
- Automated exploitation
Application
- Introduction
- Web application mapping
- Exploit file upload vulnerabilities
- Exploit remote code execution vulnerabilities
- Shell from local file inclusion vulnerabilities
- Shell from remote file inclusion vulnerabilities
- Cross-site scripting (XSS)
- Discover XSS vulnerabilities
- Hooking targets to BeEF using XSS
- Become admin by manipulating cookies
- Clickjacking
- Cross-Site Request Forgery (CSRF)
- Last resort: Brute force & Dictionary attacks
- Man-in-the-Browser (MitB)
- Browser-based attacks
- Zed Attack Proxy (ZAP)
- Post exploitation
Server
Malware
Social engineering
System
- Introduction
- Gain unauthorised access
- Upgrade basic shell access to meterpreter/empire access
- Maintaining access on Windows
- Maintaining access on macOS
- Upload and execute using empire
- Backdoor a Windows system process with empire
- Privilege escalation on macOS
- Privilege escalation on Windows
- Privilege escalation on Linux
- Pivoting using meterpreter autoroute
Forest
API's
CI/CD pipeline
Network
- Introduction
- Sniffing
- ARP spoofing
- Compromise router
- Attack domestic WiFi
- IP spoofing
- Denial of Service (DoS)
- Distributed Denial of Service (DDoS)
- Distributed Deflection Denial of Service (DrDoS)
- Hijack session (network)
- Replay attack
- TCP sequence prediction attack
- Hijack BGP
- DNS spoofing
- DNS attacks
- SSL Beast
- SSL Hijacking
- SSL Stripping
- Man-in-the-Middle (MitM)
- Port redirection
- Virtual host confusion attack
Crypto
Malware on steroids
Troubleshooting