Core technical questions specific to red team operations and advanced offensive security.
Social media analysis, corporate intelligence, technical recon
Social engineering, physical access, surveillance techniques
Network discovery, service enumeration, topology mapping
User enumeration, group discovery, trust relationships
Vulnerability research, exploit development, shellcode creation
Vulnerability discovery, exploit development, responsible disclosure
AV bypass, sandbox evasion, behavioral analysis
Credential harvesting, pass-the-hash, golden ticket attacks
Registry modifications, scheduled tasks, service installation
Domain generation, traffic blending, infrastructure management
Signature evasion, behavioral analysis, timing techniques
Steganography, DNS tunneling, encrypted channels
TTP analysis, threat intelligence, realistic scenarios
Planning, execution, reporting, lessons learned
Objectives, metrics, business impact assessment
Collaboration, knowledge sharing, continuous improvement
Real-world scenarios to test your practical red team skills.
Long-term persistence, advanced evasion, data theft
Third-party compromise, lateral movement, impact assessment
Privileged access abuse, data exfiltration, detection evasion
Cloud misconfigurations, IAM abuse, data breach
Custom malware, evasion techniques, persistence mechanisms
Lateral movement, privilege escalation, network traversal
Signature evasion, behavioral analysis, timing techniques
Steganography, DNS tunneling, encrypted channels
Essential tools and technologies every red team operator should know.