Red Team Operator Interview

Comprehensive interview preparation for red team roles, covering advanced offensive security, adversary simulation, and advanced exploitation techniques.

Advanced Reconnaissance
Advanced Exploitation
Persistence & Evasion
Adversary Simulation

Technical Questions

Core technical questions specific to red team operations and advanced offensive security.

Advanced Reconnaissance

Q: How do you conduct OSINT for red team operations?

Social media analysis, corporate intelligence, technical recon

Q: Explain your approach to physical reconnaissance

Social engineering, physical access, surveillance techniques

Q: How do you map internal networks?

Network discovery, service enumeration, topology mapping

Q: What's your experience with active directory enumeration?

User enumeration, group discovery, trust relationships

Advanced Exploitation

Q: How do you develop custom exploits?

Vulnerability research, exploit development, shellcode creation

Q: Explain your experience with zero-day exploits

Vulnerability discovery, exploit development, responsible disclosure

Q: How do you handle advanced evasion techniques?

AV bypass, sandbox evasion, behavioral analysis

Q: What's your approach to lateral movement?

Credential harvesting, pass-the-hash, golden ticket attacks

Persistence & Evasion

Q: How do you establish persistence in compromised systems?

Registry modifications, scheduled tasks, service installation

Q: Explain your C2 infrastructure design

Domain generation, traffic blending, infrastructure management

Q: How do you evade detection systems?

Signature evasion, behavioral analysis, timing techniques

Q: What's your approach to data exfiltration?

Steganography, DNS tunneling, encrypted channels

Adversary Simulation

Q: How do you emulate real-world threat actors?

TTP analysis, threat intelligence, realistic scenarios

Q: Explain your red team methodology

Planning, execution, reporting, lessons learned

Q: How do you measure red team success?

Objectives, metrics, business impact assessment

Q: What's your approach to purple teaming?

Collaboration, knowledge sharing, continuous improvement

Practical Scenarios

Real-world scenarios to test your practical red team skills.

Advanced Attack Scenarios

Scenario: APT-style attack simulation

Long-term persistence, advanced evasion, data theft

Scenario: Supply chain attack simulation

Third-party compromise, lateral movement, impact assessment

Scenario: Insider threat simulation

Privileged access abuse, data exfiltration, detection evasion

Scenario: Cloud environment compromise

Cloud misconfigurations, IAM abuse, data breach

Evasion & Persistence

Scenario: Advanced malware deployment

Custom malware, evasion techniques, persistence mechanisms

Scenario: Network segmentation bypass

Lateral movement, privilege escalation, network traversal

Scenario: Detection system evasion

Signature evasion, behavioral analysis, timing techniques

Scenario: Data exfiltration without detection

Steganography, DNS tunneling, encrypted channels

Tools & Technologies

Essential tools and technologies every red team operator should know.

C2 Frameworks

  • • Cobalt Strike
  • • Empire
  • • Covenant
  • • Metasploit
  • • Custom frameworks

Exploitation Tools

  • • Metasploit
  • • CVE databases
  • • Exploit kits
  • • Custom exploits
  • • Proof-of-concepts

Reconnaissance Tools

  • • Recon-ng
  • • Maltego
  • • theHarvester
  • • Shodan
  • • Custom scripts