@rfxlamia/skillkit 1.1.0 → 1.2.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/agents/agents/creative-copywriter.md +212 -0
- package/agents/agents/dario-amodei.md +135 -0
- package/agents/agents/doc-simplifier.md +63 -0
- package/agents/agents/kotlin-pro.md +433 -0
- package/agents/agents/red-team.md +136 -0
- package/agents/agents/sam-altman.md +121 -0
- package/agents/agents/seo-manager.md +184 -0
- package/package.json +1 -1
- package/skills/skillkit-help/SKILL.md +81 -0
- package/skills/skillkit-help/knowledge/application/09-case-studies.md +257 -0
- package/skills/skillkit-help/knowledge/application/12-testing-and-validation.md +276 -0
- package/skills/skillkit-help/knowledge/foundation/01-why-skills-exist.md +246 -0
- package/skills/skillkit-help/knowledge/foundation/02-skills-vs-subagents-comparison.md +312 -0
- package/skills/skillkit-help/knowledge/foundation/03-skills-vs-subagents-decision-tree.md +346 -0
- package/skills/skillkit-help/knowledge/foundation/06-platform-constraints.md +237 -0
- package/skills/skillkit-help/knowledge/foundation/08-when-not-to-use-skills.md +270 -0
- package/skills/skillkit-help/template/SKILL.md +52 -0
- package/skills/skills/adversarial-review/SKILL.md +219 -0
- package/skills/skills/baby-education/SKILL.md +260 -0
- package/skills/skills/baby-education/references/advanced-techniques.md +323 -0
- package/skills/skills/baby-education/references/transformations.md +345 -0
- package/skills/skills/been-there-done-that/SKILL.md +455 -0
- package/skills/skills/been-there-done-that/references/analysis-patterns.md +162 -0
- package/skills/skills/been-there-done-that/references/git-commands.md +132 -0
- package/skills/skills/been-there-done-that/references/tree-insertion-logic.md +145 -0
- package/skills/skills/coolhunter/SKILL.md +270 -0
- package/skills/skills/coolhunter/assets/elicitation-methods.csv +51 -0
- package/skills/skills/coolhunter/knowledge/elicitation-methods.md +312 -0
- package/skills/skills/coolhunter/references/workflow-execution.md +238 -0
- package/skills/skills/coolhunter/workflow-plan-coolhunter.md +232 -0
- package/skills/skills/creative-copywriting/SKILL.md +324 -0
- package/skills/skills/creative-copywriting/databases/README.md +60 -0
- package/skills/skills/creative-copywriting/databases/carousel-structures.csv +16 -0
- package/skills/skills/creative-copywriting/databases/emotional-arcs.csv +11 -0
- package/skills/skills/creative-copywriting/databases/hook-formulas.csv +51 -0
- package/skills/skills/creative-copywriting/databases/power-words.csv +201 -0
- package/skills/skills/creative-copywriting/databases/psychological-triggers.csv +21 -0
- package/skills/skills/creative-copywriting/databases/read-more-patterns.csv +26 -0
- package/skills/skills/creative-copywriting/databases/swipe-triggers.csv +31 -0
- package/skills/skills/creative-copywriting/references/carousel-psychology.md +223 -0
- package/skills/skills/creative-copywriting/references/hook-anatomy.md +169 -0
- package/skills/skills/creative-copywriting/references/power-word-science.md +134 -0
- package/skills/skills/creative-copywriting/references/storytelling-frameworks.md +157 -0
- package/skills/skills/diverse-content-gen/SKILL.md +201 -0
- package/skills/skills/diverse-content-gen/references/advanced-techniques.md +320 -0
- package/skills/skills/diverse-content-gen/references/research-findings.md +379 -0
- package/skills/skills/diverse-content-gen/references/task-workflows.md +241 -0
- package/skills/skills/diverse-content-gen/references/tool-integration.md +419 -0
- package/skills/skills/diverse-content-gen/references/troubleshooting.md +426 -0
- package/skills/skills/diverse-content-gen/references/vs-core-technique.md +240 -0
- package/skills/skills/framework-critical-thinking/SKILL.md +220 -0
- package/skills/skills/framework-critical-thinking/references/bias_detector.md +375 -0
- package/skills/skills/framework-critical-thinking/references/fallback_handler.md +239 -0
- package/skills/skills/framework-critical-thinking/references/memory_curator.md +161 -0
- package/skills/skills/framework-critical-thinking/references/metacognitive_monitor.md +297 -0
- package/skills/skills/framework-critical-thinking/references/producer_critic_orchestrator.md +333 -0
- package/skills/skills/framework-critical-thinking/references/reasoning_router.md +235 -0
- package/skills/skills/framework-critical-thinking/references/reasoning_validator.md +97 -0
- package/skills/skills/framework-critical-thinking/references/reflection_trigger.md +78 -0
- package/skills/skills/framework-critical-thinking/references/self_verification.md +388 -0
- package/skills/skills/framework-critical-thinking/references/uncertainty_quantifier.md +207 -0
- package/skills/skills/framework-initiative/SKILL.md +231 -0
- package/skills/skills/framework-initiative/references/examples.md +150 -0
- package/skills/skills/framework-initiative/references/impact-analysis.md +157 -0
- package/skills/skills/framework-initiative/references/intent-patterns.md +145 -0
- package/skills/skills/framework-initiative/references/star-framework.md +165 -0
- package/skills/skills/humanize-docs/SKILL.md +203 -0
- package/skills/skills/humanize-docs/references/advanced-techniques.md +13 -0
- package/skills/skills/humanize-docs/references/core-transformations.md +368 -0
- package/skills/skills/humanize-docs/references/detection-patterns.md +400 -0
- package/skills/skills/humanize-docs/references/examples-gallery.md +374 -0
- package/skills/skills/imagine/SKILL.md +190 -0
- package/skills/skills/imagine/references/artstyle-corporate-memphis.md +625 -0
- package/skills/skills/imagine/references/artstyle-crewdson-hyperrealism.md +295 -0
- package/skills/skills/imagine/references/artstyle-iphone-social-media.md +426 -0
- package/skills/skills/imagine/references/artstyle-sciencesaru.md +276 -0
- package/skills/skills/pre-deploy-checklist/README.md +26 -0
- package/skills/skills/pre-deploy-checklist/SKILL.md +153 -0
- package/skills/skills/pre-deploy-checklist/references/checklist-categories.md +174 -0
- package/skills/skills/pre-deploy-checklist/references/domain-prompts.md +216 -0
- package/skills/skills/prompt-engineering/SKILL.md +209 -0
- package/skills/skills/prompt-engineering/references/advanced-combinations.md +444 -0
- package/skills/skills/prompt-engineering/references/chain-of-thought.md +140 -0
- package/skills/skills/prompt-engineering/references/decision_matrix.md +220 -0
- package/skills/skills/prompt-engineering/references/few-shot.md +346 -0
- package/skills/skills/prompt-engineering/references/json-format.md +270 -0
- package/skills/skills/prompt-engineering/references/natural-language.md +420 -0
- package/skills/skills/prompt-engineering/references/pitfalls.md +365 -0
- package/skills/skills/prompt-engineering/references/prompt-chaining.md +498 -0
- package/skills/skills/prompt-engineering/references/react.md +108 -0
- package/skills/skills/prompt-engineering/references/self-consistency.md +322 -0
- package/skills/skills/prompt-engineering/references/tree-of-thoughts.md +386 -0
- package/skills/skills/prompt-engineering/references/xml-format.md +220 -0
- package/skills/skills/prompt-engineering/references/yaml-format.md +488 -0
- package/skills/skills/prompt-engineering/references/zero-shot.md +74 -0
- package/skills/skills/quick-spec/SKILL.md +280 -0
- package/skills/skills/quick-spec/assets/tech-spec-template.md +74 -0
- package/skills/skills/quick-spec/references/step-01-understand.md +189 -0
- package/skills/skills/quick-spec/references/step-02-investigate.md +144 -0
- package/skills/skills/quick-spec/references/step-03-generate.md +128 -0
- package/skills/skills/quick-spec/references/step-04-review.md +173 -0
- package/skills/skills/quick-spec/tests/__pycache__/test_skill.cpython-314-pytest-9.0.2.pyc +0 -0
- package/skills/skills/quick-spec/tests/test_scenarios.md +83 -0
- package/skills/skills/quick-spec/tests/test_skill.py +136 -0
- package/skills/skills/readme-expert/SKILL.md +538 -0
- package/skills/skills/readme-expert/knowledge/INDEX.md +192 -0
- package/skills/skills/readme-expert/knowledge/application/quality-standards.md +470 -0
- package/skills/skills/readme-expert/knowledge/application/script-executor.md +604 -0
- package/skills/skills/readme-expert/knowledge/application/template-library.md +822 -0
- package/skills/skills/readme-expert/knowledge/foundation/codebase-scanner.md +361 -0
- package/skills/skills/readme-expert/knowledge/foundation/validation-checklist.md +481 -0
- package/skills/skills/red-teaming/SKILL.md +321 -0
- package/skills/skills/red-teaming/references/ai-llm-redteam.md +517 -0
- package/skills/skills/red-teaming/references/attack-techniques.md +410 -0
- package/skills/skills/red-teaming/references/cybersecurity-redteam.md +383 -0
- package/skills/skills/red-teaming/references/tools-frameworks.md +446 -0
- package/skills/skills/releasing/.skillkit-mode +1 -0
- package/skills/skills/releasing/SKILL.md +225 -0
- package/skills/skills/releasing/references/version-detection.md +108 -0
- package/skills/skills/screenwriter/SKILL.md +273 -0
- package/skills/skills/screenwriter/references/advanced-techniques.md +216 -0
- package/skills/skills/screenwriter/references/pipeline-integration.md +266 -0
- package/skills/skills/skillkit/.claude/settings.local.json +7 -0
- package/skills/skills/skillkit/.claude-plugin/plugin.json +27 -0
- package/skills/skills/skillkit/CHANGELOG.md +484 -0
- package/skills/skills/skillkit/SKILL.md +511 -0
- package/skills/skills/skillkit/commands/skillkit.md +6 -0
- package/skills/skills/skillkit/commands/validate-plan.md +6 -0
- package/skills/skills/skillkit/commands/verify.md +6 -0
- package/skills/skills/skillkit/knowledge/INDEX.md +352 -0
- package/skills/skills/skillkit/knowledge/application/09-case-studies.md +257 -0
- package/skills/skills/skillkit/knowledge/application/10-technical-architecture.md +324 -0
- package/skills/skills/skillkit/knowledge/application/11-adoption-strategy.md +267 -0
- package/skills/skills/skillkit/knowledge/application/12-testing-and-validation.md +276 -0
- package/skills/skills/skillkit/knowledge/application/13-competitive-landscape.md +198 -0
- package/skills/skills/skillkit/knowledge/foundation/01-why-skills-exist.md +246 -0
- package/skills/skills/skillkit/knowledge/foundation/02-skills-vs-subagents-comparison.md +312 -0
- package/skills/skills/skillkit/knowledge/foundation/03-skills-vs-subagents-decision-tree.md +346 -0
- package/skills/skills/skillkit/knowledge/foundation/04-hybrid-patterns.md +308 -0
- package/skills/skills/skillkit/knowledge/foundation/05-token-economics.md +275 -0
- package/skills/skills/skillkit/knowledge/foundation/06-platform-constraints.md +237 -0
- package/skills/skills/skillkit/knowledge/foundation/07-security-concerns.md +322 -0
- package/skills/skills/skillkit/knowledge/foundation/08-when-not-to-use-skills.md +270 -0
- package/skills/skills/skillkit/knowledge/plugin-guide.md +614 -0
- package/skills/skills/skillkit/knowledge/tools/14-validation-tools-guide.md +150 -0
- package/skills/skills/skillkit/knowledge/tools/15-cost-tools-guide.md +157 -0
- package/skills/skills/skillkit/knowledge/tools/16-security-tools-guide.md +122 -0
- package/skills/skills/skillkit/knowledge/tools/17-pattern-tools-guide.md +161 -0
- package/skills/skills/skillkit/knowledge/tools/18-decision-helper-guide.md +243 -0
- package/skills/skills/skillkit/knowledge/tools/19-test-generator-guide.md +275 -0
- package/skills/skills/skillkit/knowledge/tools/20-split-skill-guide.md +149 -0
- package/skills/skills/skillkit/knowledge/tools/21-quality-scorer-guide.md +226 -0
- package/skills/skills/skillkit/knowledge/tools/22-migration-helper-guide.md +356 -0
- package/skills/skills/skillkit/knowledge/tools/23-subagent-creation-guide.md +448 -0
- package/skills/skills/skillkit/knowledge/tools/24-behavioral-testing-guide.md +122 -0
- package/skills/skills/skillkit/references/proposal-generation.md +982 -0
- package/skills/skills/skillkit/references/rationalization-catalog.md +75 -0
- package/skills/skills/skillkit/references/research-methodology.md +661 -0
- package/skills/skills/skillkit/references/section-2-full-creation-workflow.md +452 -0
- package/skills/skills/skillkit/references/section-3-validation-workflow-existing-skill.md +63 -0
- package/skills/skills/skillkit/references/section-4-decision-workflow-skills-vs-subagents.md +64 -0
- package/skills/skills/skillkit/references/section-5-migration-workflow-doc-to-skill.md +58 -0
- package/skills/skills/skillkit/references/section-6-subagent-creation-workflow.md +499 -0
- package/skills/skills/skillkit/references/section-7-knowledge-reference-map.md +72 -0
- package/skills/skills/skillkit/scripts/__pycache__/decision_helper.cpython-314.pyc +0 -0
- package/skills/skills/skillkit/scripts/__pycache__/quick_validate.cpython-312.pyc +0 -0
- package/skills/skills/skillkit/scripts/__pycache__/quick_validate.cpython-314.pyc +0 -0
- package/skills/skills/skillkit/scripts/__pycache__/test_generator.cpython-314-pytest-9.0.2.pyc +0 -0
- package/skills/skills/skillkit/scripts/decision_helper.py +799 -0
- package/skills/skills/skillkit/scripts/init_skill.py +400 -0
- package/skills/skills/skillkit/scripts/init_subagent.py +231 -0
- package/skills/skills/skillkit/scripts/migration_helper.py +669 -0
- package/skills/skills/skillkit/scripts/package_skill.py +211 -0
- package/skills/skills/skillkit/scripts/pattern_detector.py +381 -0
- package/skills/skills/skillkit/scripts/pattern_detector_new.py +382 -0
- package/skills/skills/skillkit/scripts/pressure_tester.py +157 -0
- package/skills/skills/skillkit/scripts/quality_scorer.py +999 -0
- package/skills/skills/skillkit/scripts/quick_validate.py +100 -0
- package/skills/skills/skillkit/scripts/security_scanner.py +474 -0
- package/skills/skills/skillkit/scripts/split_skill.py +540 -0
- package/skills/skills/skillkit/scripts/test_generator.py +695 -0
- package/skills/skills/skillkit/scripts/token_estimator.py +493 -0
- package/skills/skills/skillkit/scripts/utils/__init__.py +49 -0
- package/skills/skills/skillkit/scripts/utils/__pycache__/__init__.cpython-312.pyc +0 -0
- package/skills/skills/skillkit/scripts/utils/__pycache__/__init__.cpython-314.pyc +0 -0
- package/skills/skills/skillkit/scripts/utils/__pycache__/budget_tracker.cpython-312.pyc +0 -0
- package/skills/skills/skillkit/scripts/utils/__pycache__/budget_tracker.cpython-314.pyc +0 -0
- package/skills/skills/skillkit/scripts/utils/__pycache__/output_formatter.cpython-312.pyc +0 -0
- package/skills/skills/skillkit/scripts/utils/__pycache__/output_formatter.cpython-314.pyc +0 -0
- package/skills/skills/skillkit/scripts/utils/__pycache__/reference_validator.cpython-312.pyc +0 -0
- package/skills/skills/skillkit/scripts/utils/__pycache__/reference_validator.cpython-314.pyc +0 -0
- package/skills/skills/skillkit/scripts/utils/budget_tracker.py +388 -0
- package/skills/skills/skillkit/scripts/utils/output_formatter.py +263 -0
- package/skills/skills/skillkit/scripts/utils/reference_validator.py +401 -0
- package/skills/skills/skillkit/scripts/validate_skill.py +594 -0
- package/skills/skills/skillkit/tests/test_behavioral.py +39 -0
- package/skills/skills/skillkit/tests/test_scenarios.md +83 -0
- package/skills/skills/skillkit/tests/test_skill.py +136 -0
- package/skills/skills/skillkit-help/SKILL.md +81 -0
- package/skills/skills/skillkit-help/knowledge/application/09-case-studies.md +257 -0
- package/skills/skills/skillkit-help/knowledge/application/12-testing-and-validation.md +276 -0
- package/skills/skills/skillkit-help/knowledge/foundation/01-why-skills-exist.md +246 -0
- package/skills/skills/skillkit-help/knowledge/foundation/02-skills-vs-subagents-comparison.md +312 -0
- package/skills/skills/skillkit-help/knowledge/foundation/03-skills-vs-subagents-decision-tree.md +346 -0
- package/skills/skills/skillkit-help/knowledge/foundation/06-platform-constraints.md +237 -0
- package/skills/skills/skillkit-help/knowledge/foundation/08-when-not-to-use-skills.md +270 -0
- package/skills/skills/skillkit-help/template/SKILL.md +52 -0
- package/skills/skills/social-media-seo/SKILL.md +278 -0
- package/skills/skills/social-media-seo/databases/caption-styles.csv +31 -0
- package/skills/skills/social-media-seo/databases/engagement-tactics.csv +16 -0
- package/skills/skills/social-media-seo/databases/hashtag-strategies.csv +21 -0
- package/skills/skills/social-media-seo/databases/hook-formulas.csv +26 -0
- package/skills/skills/social-media-seo/databases/keyword-clusters.csv +11 -0
- package/skills/skills/social-media-seo/databases/thread-structures.csv +26 -0
- package/skills/skills/social-media-seo/databases/viral-patterns.csv +21 -0
- package/skills/skills/social-media-seo/references/analytics-guide.md +321 -0
- package/skills/skills/social-media-seo/references/instagram-seo.md +235 -0
- package/skills/skills/social-media-seo/references/threads-seo.md +305 -0
- package/skills/skills/social-media-seo/references/x-twitter-seo.md +337 -0
- package/skills/skills/social-media-seo/scripts/query_database.py +191 -0
- package/skills/skills/storyteller/SKILL.md +241 -0
- package/skills/skills/storyteller/references/transformation-methodology.md +293 -0
- package/skills/skills/storyteller/references/visual-vocabulary.md +177 -0
- package/skills/skills/thread-pro/SKILL.md +162 -0
- package/skills/skills/thread-pro/anti-ai-patterns.md +120 -0
- package/skills/skills/thread-pro/hook-formulas.md +138 -0
- package/skills/skills/thread-pro/references/anti-ai-patterns.md +120 -0
- package/skills/skills/thread-pro/references/hook-formulas.md +138 -0
- package/skills/skills/thread-pro/references/thread-structures.md +240 -0
- package/skills/skills/thread-pro/references/voice-injection.md +130 -0
- package/skills/skills/thread-pro/thread-structures.md +240 -0
- package/skills/skills/thread-pro/voice-injection.md +130 -0
- package/skills/skills/tinkering/SKILL.md +251 -0
- package/skills/skills/tinkering/references/graduation-checklist.md +100 -0
- package/skills/skills/validate-plan/.skillkit-mode +1 -0
- package/skills/skills/validate-plan/SKILL.md +406 -0
- package/skills/skills/validate-plan/references/dry-principles.md +251 -0
- package/skills/skills/validate-plan/references/gap-analysis-guide.md +320 -0
- package/skills/skills/validate-plan/references/tdd-patterns.md +413 -0
- package/skills/skills/validate-plan/references/yagni-checklist.md +330 -0
- package/skills/skills/verify-before-ship/.skillkit-mode +1 -0
- package/skills/skills/verify-before-ship/SKILL.md +116 -0
- package/skills/skills/verify-before-ship/references/anti-rationalization.md +212 -0
- package/skills/skills/verify-before-ship/references/verification-gates.md +305 -0
- package/skills-manifest.json +8 -2
- package/src/picker.js +11 -5
- package/src/picker.test.js +36 -1
|
@@ -0,0 +1,383 @@
|
|
|
1
|
+
# Cybersecurity Red Teaming
|
|
2
|
+
|
|
3
|
+
## Table of Contents
|
|
4
|
+
|
|
5
|
+
1. [Overview](#overview)
|
|
6
|
+
2. [MITRE ATT&CK Framework Integration](#mitre-attck-framework-integration)
|
|
7
|
+
- 14 ATT&CK Tactics
|
|
8
|
+
- Using ATT&CK for Red Teaming
|
|
9
|
+
3. [7-Phase Cybersecurity Red Team Methodology](#7-phase-cybersecurity-red-team-methodology)
|
|
10
|
+
- Phase 1: Intelligence Gathering
|
|
11
|
+
- Phase 2: Vulnerability Detection
|
|
12
|
+
- Phase 3: Exploitation & Initial Access
|
|
13
|
+
- Phase 4: Lateral Movement
|
|
14
|
+
- Phase 5: Privilege Escalation
|
|
15
|
+
- Phase 6: Persistence
|
|
16
|
+
- Phase 7: Objective Achievement & Reporting
|
|
17
|
+
4. [Purple Team Practices](#purple-team-practices)
|
|
18
|
+
5. [Tools & Frameworks](#tools--frameworks)
|
|
19
|
+
6. [Critical Reminders](#critical-reminders)
|
|
20
|
+
|
|
21
|
+
## Overview
|
|
22
|
+
|
|
23
|
+
This reference provides detailed methodology for traditional cybersecurity red teaming, focusing on network penetration, infrastructure compromise, and adversary emulation using the MITRE ATT&CK framework.
|
|
24
|
+
|
|
25
|
+
## MITRE ATT&CK Framework Integration
|
|
26
|
+
|
|
27
|
+
### What is MITRE ATT&CK?
|
|
28
|
+
|
|
29
|
+
MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) is a globally-accessible knowledge base of adversary behaviors based on real-world observations.
|
|
30
|
+
|
|
31
|
+
**Components:**
|
|
32
|
+
- **Tactics**: "Why" - Tactical goals (e.g., Initial Access, Persistence, Privilege Escalation)
|
|
33
|
+
- **Techniques**: "How" - Methods to achieve tactics (e.g., Spear Phishing, DLL Injection)
|
|
34
|
+
- **Procedures**: Technical implementation details (specific commands, tools)
|
|
35
|
+
|
|
36
|
+
### 14 ATT&CK Tactics
|
|
37
|
+
|
|
38
|
+
1. **Reconnaissance**: Gather information to plan operations
|
|
39
|
+
2. **Resource Development**: Establish resources for operations (infrastructure, tools)
|
|
40
|
+
3. **Initial Access**: Gain foothold in target network
|
|
41
|
+
4. **Execution**: Run malicious code
|
|
42
|
+
5. **Persistence**: Maintain access across reboots/credential changes
|
|
43
|
+
6. **Privilege Escalation**: Gain higher-level permissions
|
|
44
|
+
7. **Defense Evasion**: Avoid detection by security tools
|
|
45
|
+
8. **Credential Access**: Steal usernames, passwords, tokens
|
|
46
|
+
9. **Discovery**: Learn about internal environment
|
|
47
|
+
10. **Lateral Movement**: Move through victim network
|
|
48
|
+
11. **Collection**: Gather data of interest
|
|
49
|
+
12. **Command & Control**: Communicate with compromised systems
|
|
50
|
+
13. **Exfiltration**: Steal data from network
|
|
51
|
+
14. **Impact**: Disrupt availability, integrity, or data destruction
|
|
52
|
+
|
|
53
|
+
### Using ATT&CK for Red Teaming
|
|
54
|
+
|
|
55
|
+
**Step 1: Select Target APT Group**
|
|
56
|
+
- Identify adversary groups relevant to your industry
|
|
57
|
+
- MITRE maintains profiles for 130+ APT groups
|
|
58
|
+
- Example: APT28 (Fancy Bear), APT29 (Cozy Bear), APT3
|
|
59
|
+
|
|
60
|
+
**Step 2: Map TTPs to Red Team Plan**
|
|
61
|
+
- Use MITRE ATT&CK Navigator (web-based visualization tool)
|
|
62
|
+
- Create layers mapping APT group TTPs to your operation
|
|
63
|
+
- Prioritize techniques based on detection coverage gaps
|
|
64
|
+
|
|
65
|
+
**Step 3: Emulate Adversary Behavior**
|
|
66
|
+
- Use tools like Atomic Red Team for pre-built technique tests
|
|
67
|
+
- Execute ATT&CK techniques in realistic sequence
|
|
68
|
+
- Document which techniques succeed vs. detected
|
|
69
|
+
|
|
70
|
+
**Step 4: Measure Detection Coverage**
|
|
71
|
+
- Mark techniques as: Detected (green), Partially Detected (yellow), Missed (red)
|
|
72
|
+
- Identify blind spots in security monitoring
|
|
73
|
+
- Provide heat map to blue team
|
|
74
|
+
|
|
75
|
+
## 7-Phase Cybersecurity Red Team Methodology
|
|
76
|
+
|
|
77
|
+
### Phase 1: Intelligence Gathering
|
|
78
|
+
|
|
79
|
+
**Objectives:**
|
|
80
|
+
- Build comprehensive target profile
|
|
81
|
+
- Identify attack surface
|
|
82
|
+
- Map technology stack
|
|
83
|
+
|
|
84
|
+
**OSINT Techniques:**
|
|
85
|
+
- **Domain Intelligence**: WHOIS, DNS records, subdomains (Sublist3r, Amass)
|
|
86
|
+
- **Network Intelligence**: Shodan, Censys for exposed services
|
|
87
|
+
- **Employee Intelligence**: LinkedIn, social media for org chart and technology mentions
|
|
88
|
+
- **Technology Stack**: Wappalyzer, BuiltWith, job postings
|
|
89
|
+
- **Document Metadata**: ExifTool for leaked files
|
|
90
|
+
- **Code Repositories**: GitHub for exposed credentials, architectural insights
|
|
91
|
+
|
|
92
|
+
**Active Reconnaissance:**
|
|
93
|
+
- **Network Scanning**: Nmap for port discovery and service enumeration
|
|
94
|
+
- **Web Application Mapping**: Burp Suite, OWASP ZAP
|
|
95
|
+
- **Email Harvesting**: theHarvester, Hunter.io
|
|
96
|
+
|
|
97
|
+
**Deliverable:** Intelligence report with target profile, asset inventory, initial attack vectors
|
|
98
|
+
|
|
99
|
+
### Phase 2: Vulnerability Detection
|
|
100
|
+
|
|
101
|
+
**Objectives:**
|
|
102
|
+
- Identify weaknesses in perimeter and internal systems
|
|
103
|
+
- Prioritize high-impact vulnerabilities
|
|
104
|
+
- Map vulnerabilities to ATT&CK techniques
|
|
105
|
+
|
|
106
|
+
**Technical Scanning:**
|
|
107
|
+
- **Network Vulnerability Scanners**: Nessus, OpenVAS, Qualys
|
|
108
|
+
- **Web Application Scanners**: Burp Suite Pro, Acunetix
|
|
109
|
+
- **Configuration Audits**: CIS benchmarks, security misconfigurations
|
|
110
|
+
- **Credential Stuffing**: Test for weak/default credentials
|
|
111
|
+
|
|
112
|
+
**Manual Testing:**
|
|
113
|
+
- **Authentication Bypass**: Logic flaws in login mechanisms
|
|
114
|
+
- **Injection Vulnerabilities**: SQL injection, command injection
|
|
115
|
+
- **Business Logic Flaws**: Privilege escalation, horizontal authorization bypass
|
|
116
|
+
- **API Security**: Broken object level authorization, excessive data exposure
|
|
117
|
+
|
|
118
|
+
**Vulnerability Prioritization:**
|
|
119
|
+
- **CVSS Score**: Technical severity rating
|
|
120
|
+
- **Exploitability**: Public exploits available? Exploit complexity?
|
|
121
|
+
- **Business Impact**: What data/systems are at risk?
|
|
122
|
+
- **Detection Likelihood**: Will exploit trigger alarms?
|
|
123
|
+
|
|
124
|
+
**Deliverable:** Prioritized vulnerability report with exploitation feasibility assessment
|
|
125
|
+
|
|
126
|
+
### Phase 3: Exploitation & Initial Access
|
|
127
|
+
|
|
128
|
+
**Objectives:**
|
|
129
|
+
- Gain foothold in target network
|
|
130
|
+
- Establish command & control (C2)
|
|
131
|
+
- Begin lateral movement preparation
|
|
132
|
+
|
|
133
|
+
**Common Initial Access Vectors:**
|
|
134
|
+
|
|
135
|
+
**External Exploitation:**
|
|
136
|
+
- **Web Application Exploits**: SQL injection, RCE, file upload vulnerabilities
|
|
137
|
+
- **VPN/RAS Exploits**: Pulse Secure, Citrix, Fortinet vulnerabilities
|
|
138
|
+
- **Email Server Exploits**: Exchange ProxyShell, ProxyLogon
|
|
139
|
+
|
|
140
|
+
**Phishing & Social Engineering:**
|
|
141
|
+
- **Spear Phishing**: Targeted emails with malicious attachments/links
|
|
142
|
+
- **Credential Harvesting**: Fake login pages to steal credentials
|
|
143
|
+
- **Watering Hole**: Compromise websites target employees visit
|
|
144
|
+
- **Pretexting**: Phone calls to helpdesk for password resets
|
|
145
|
+
|
|
146
|
+
**Physical Access:**
|
|
147
|
+
- **Badge Cloning**: RFID duplication for building access
|
|
148
|
+
- **Tailgating**: Follow authorized personnel into secure areas
|
|
149
|
+
- **USB Drops**: Plant USB Rubber Ducky with payload
|
|
150
|
+
|
|
151
|
+
**Exploitation Frameworks:**
|
|
152
|
+
- **Metasploit**: Comprehensive exploit database and post-exploitation
|
|
153
|
+
- **Cobalt Strike**: Commercial C2 platform (legitimate red team tool)
|
|
154
|
+
- **Empire/Starkiller**: PowerShell and Python post-exploitation framework
|
|
155
|
+
- **Sliver**: Open-source C2 framework
|
|
156
|
+
|
|
157
|
+
**Establishing C2:**
|
|
158
|
+
- **HTTP/HTTPS**: Blend with normal traffic
|
|
159
|
+
- **DNS Tunneling**: Exfiltrate data via DNS queries
|
|
160
|
+
- **Social Media**: Use Twitter/Telegram APIs for C2 (covert channel)
|
|
161
|
+
- **Cloud Services**: Dropbox, Google Drive for staging/exfiltration
|
|
162
|
+
|
|
163
|
+
**Deliverable:** Successful access to target network with C2 established
|
|
164
|
+
|
|
165
|
+
### Phase 4: Lateral Movement
|
|
166
|
+
|
|
167
|
+
**Objectives:**
|
|
168
|
+
- Move from initial foothold to high-value targets
|
|
169
|
+
- Avoid detection during network traversal
|
|
170
|
+
- Map internal network topology
|
|
171
|
+
|
|
172
|
+
**Lateral Movement Techniques:**
|
|
173
|
+
|
|
174
|
+
**Credential-Based Movement:**
|
|
175
|
+
- **Pass-the-Hash**: Authenticate using NTLM hash (Mimikatz)
|
|
176
|
+
- **Pass-the-Ticket**: Kerberos ticket reuse
|
|
177
|
+
- **Credential Dumping**: LSASS memory, SAM database, NTDS.dit
|
|
178
|
+
- **Kerberoasting**: Extract and crack service account hashes
|
|
179
|
+
|
|
180
|
+
**Exploitation-Based Movement:**
|
|
181
|
+
- **SMB Exploits**: EternalBlue (MS17-010), SMBGhost
|
|
182
|
+
- **RDP Exploits**: BlueKeep (CVE-2019-0708)
|
|
183
|
+
- **Remote Code Execution**: PSExec, WMI, WinRM
|
|
184
|
+
|
|
185
|
+
**Living-Off-the-Land (LOLBins):**
|
|
186
|
+
- **PowerShell**: Execute scripts in memory, avoid disk-based detection
|
|
187
|
+
- **WMI (Windows Management Instrumentation)**: Remote command execution
|
|
188
|
+
- **PsExec**: Sysinternals tool for lateral movement
|
|
189
|
+
- **DCOM**: Distributed COM for remote execution
|
|
190
|
+
|
|
191
|
+
**Internal Reconnaissance:**
|
|
192
|
+
- **Active Directory Enumeration**: BloodHound for AD attack paths
|
|
193
|
+
- **Network Scanning**: Discover additional hosts and services
|
|
194
|
+
- **Share Enumeration**: Find sensitive data in file shares
|
|
195
|
+
- **Service Account Discovery**: Identify high-privilege accounts
|
|
196
|
+
|
|
197
|
+
**Deliverable:** Network topology map with compromised hosts and privilege levels
|
|
198
|
+
|
|
199
|
+
### Phase 5: Privilege Escalation
|
|
200
|
+
|
|
201
|
+
**Objectives:**
|
|
202
|
+
- Gain administrative/root access
|
|
203
|
+
- Compromise domain administrator accounts
|
|
204
|
+
- Full control of critical infrastructure
|
|
205
|
+
|
|
206
|
+
**Windows Privilege Escalation:**
|
|
207
|
+
- **Unquoted Service Paths**: DLL hijacking in service paths
|
|
208
|
+
- **Weak Service Permissions**: Modify service binaries or configuration
|
|
209
|
+
- **Token Impersonation**: Rotten Potato, Juicy Potato
|
|
210
|
+
- **Kernel Exploits**: CVE-based privilege escalation
|
|
211
|
+
- **UAC Bypass**: User Account Control evasion
|
|
212
|
+
|
|
213
|
+
**Linux Privilege Escalation:**
|
|
214
|
+
- **SUID Binaries**: Exploit set-UID programs for root access
|
|
215
|
+
- **Kernel Exploits**: Dirty COW, local privilege escalation vulnerabilities
|
|
216
|
+
- **Sudo Misconfigurations**: NOPASSWD entries, wildcards
|
|
217
|
+
- **Cron Jobs**: Writable scripts executed as root
|
|
218
|
+
- **Capabilities**: Abuse Linux capabilities (e.g., CAP_SYS_ADMIN)
|
|
219
|
+
|
|
220
|
+
**Active Directory Attacks:**
|
|
221
|
+
- **Golden Ticket**: Forge Kerberos TGTs with KRBTGT hash
|
|
222
|
+
- **Silver Ticket**: Forge service tickets for specific services
|
|
223
|
+
- **DCSync**: Replicate Active Directory credentials
|
|
224
|
+
- **AdminSDHolder**: Persist via Protected Groups
|
|
225
|
+
|
|
226
|
+
**Deliverable:** Domain administrator or root-level access to critical systems
|
|
227
|
+
|
|
228
|
+
### Phase 6: Persistence
|
|
229
|
+
|
|
230
|
+
**Objectives:**
|
|
231
|
+
- Maintain access through reboots, credential changes
|
|
232
|
+
- Install multiple backdoors for redundancy
|
|
233
|
+
- Ensure covert long-term access
|
|
234
|
+
|
|
235
|
+
**Persistence Techniques:**
|
|
236
|
+
|
|
237
|
+
**Windows Persistence:**
|
|
238
|
+
- **Registry Run Keys**: HKLM/HKCU Run, RunOnce
|
|
239
|
+
- **Scheduled Tasks**: Trigger malicious payloads at intervals
|
|
240
|
+
- **Services**: Install malicious Windows services
|
|
241
|
+
- **WMI Event Subscriptions**: Execute code on WMI events
|
|
242
|
+
- **DLL Hijacking**: Replace legitimate DLLs with malicious versions
|
|
243
|
+
|
|
244
|
+
**Linux Persistence:**
|
|
245
|
+
- **SSH Keys**: Add public keys to `~/.ssh/authorized_keys`
|
|
246
|
+
- **Cron Jobs**: Schedule malicious scripts
|
|
247
|
+
- **Init Scripts**: `/etc/init.d/` or systemd services
|
|
248
|
+
- **LD_PRELOAD**: Inject shared libraries into processes
|
|
249
|
+
- **Web Shells**: Upload PHP/JSP shells to web servers
|
|
250
|
+
|
|
251
|
+
**Covert Persistence:**
|
|
252
|
+
- **Implants in Memory**: Fileless malware (e.g., Metasploit's Meterpreter)
|
|
253
|
+
- **Firmware Backdoors**: BIOS/UEFI rootkits
|
|
254
|
+
- **Supply Chain**: Compromise software update mechanisms
|
|
255
|
+
|
|
256
|
+
**Deliverable:** Multiple covert backdoors ensuring persistent access
|
|
257
|
+
|
|
258
|
+
### Phase 7: Objective Achievement & Reporting
|
|
259
|
+
|
|
260
|
+
**Objectives:**
|
|
261
|
+
- Accomplish defined red team goals (data exfiltration, system compromise)
|
|
262
|
+
- Document attack chain with evidence
|
|
263
|
+
- Provide comprehensive remediation guidance
|
|
264
|
+
|
|
265
|
+
**Common Objectives:**
|
|
266
|
+
- **Data Exfiltration**: Steal sensitive data (customer records, financial data, IP)
|
|
267
|
+
- **Ransomware Simulation**: Encrypt files (simulation only, no actual damage)
|
|
268
|
+
- **Domain Dominance**: Full control of Active Directory
|
|
269
|
+
- **Physical Control**: Gain access to secure facilities
|
|
270
|
+
|
|
271
|
+
**Evidence Collection:**
|
|
272
|
+
- **Screenshots**: Every critical step with timestamps
|
|
273
|
+
- **Log Files**: C2 logs, exploitation outputs
|
|
274
|
+
- **Proof of Compromise**: "Owned" files, screenshots of sensitive data access
|
|
275
|
+
- **Network Traffic Captures**: PCAP files showing attack traffic
|
|
276
|
+
|
|
277
|
+
**Reporting Structure:**
|
|
278
|
+
- **Executive Summary**
|
|
279
|
+
- Business impact assessment
|
|
280
|
+
- High-level risk scoring
|
|
281
|
+
- Key findings (3-5 critical vulnerabilities)
|
|
282
|
+
- Remediation timeline recommendations
|
|
283
|
+
|
|
284
|
+
- **Technical Findings**
|
|
285
|
+
- Attack chain diagram (visual representation)
|
|
286
|
+
- Detailed vulnerability descriptions
|
|
287
|
+
- Exploitation procedures and evidence
|
|
288
|
+
- MITRE ATT&CK mapping
|
|
289
|
+
|
|
290
|
+
- **Remediation Recommendations**
|
|
291
|
+
- Prioritized by risk (Critical → High → Medium → Low)
|
|
292
|
+
- Specific, actionable steps
|
|
293
|
+
- Detection improvements for blue team
|
|
294
|
+
- Long-term architectural recommendations
|
|
295
|
+
|
|
296
|
+
- **Indicators of Compromise (IOCs)**
|
|
297
|
+
- IP addresses used
|
|
298
|
+
- Tools and signatures
|
|
299
|
+
- Techniques observable in logs
|
|
300
|
+
- Blue team detection guidance
|
|
301
|
+
|
|
302
|
+
**Deliverable:** Comprehensive red team report with attack evidence and remediation roadmap
|
|
303
|
+
|
|
304
|
+
## Purple Team Practices
|
|
305
|
+
|
|
306
|
+
### What is Purple Teaming?
|
|
307
|
+
|
|
308
|
+
Purple teaming is collaborative security testing where red team (attackers) and blue team (defenders) work together openly, sharing knowledge in real-time to improve organizational security.
|
|
309
|
+
|
|
310
|
+
**Key Differences from Red Teaming:**
|
|
311
|
+
- **Red Team**: Covert, adversarial, blue team unaware
|
|
312
|
+
- **Purple Team**: Collaborative, blue team aware, knowledge sharing
|
|
313
|
+
|
|
314
|
+
### Purple Team Workflow
|
|
315
|
+
|
|
316
|
+
**Phase 1: Planning Together**
|
|
317
|
+
- Red and blue teams jointly define objectives
|
|
318
|
+
- Select ATT&CK techniques to test
|
|
319
|
+
- Blue team prepares detection hypotheses
|
|
320
|
+
|
|
321
|
+
**Phase 2: Controlled Attack Execution**
|
|
322
|
+
- Red team executes technique
|
|
323
|
+
- Blue team monitors detection systems in real-time
|
|
324
|
+
- Immediate feedback: "Did you see that?"
|
|
325
|
+
|
|
326
|
+
**Phase 3: Detection Tuning**
|
|
327
|
+
- If detected: Document successful detection
|
|
328
|
+
- If missed: Blue team creates new detection rule
|
|
329
|
+
- Re-test until reliable detection achieved
|
|
330
|
+
|
|
331
|
+
**Phase 4: Knowledge Transfer**
|
|
332
|
+
- Red team explains attacker tradecraft
|
|
333
|
+
- Blue team shares detection engineering insights
|
|
334
|
+
- Document lessons learned
|
|
335
|
+
|
|
336
|
+
### Purple Team Benefits
|
|
337
|
+
- Accelerates blue team skill development
|
|
338
|
+
- Validates detection coverage quickly
|
|
339
|
+
- Reduces time between detection gaps and fixes
|
|
340
|
+
- Fosters collaboration vs. adversarial culture
|
|
341
|
+
|
|
342
|
+
## Tools & Frameworks
|
|
343
|
+
|
|
344
|
+
### Command & Control (C2) Frameworks
|
|
345
|
+
- **Cobalt Strike**: Commercial, widely-used by red teams and APTs
|
|
346
|
+
- **Sliver**: Open-source, modern C2 with strong encryption
|
|
347
|
+
- **Empire**: PowerShell/Python post-exploitation framework
|
|
348
|
+
- **Mythic**: Collaborative C2 framework with web UI
|
|
349
|
+
|
|
350
|
+
### Adversary Emulation
|
|
351
|
+
- **Atomic Red Team**: Pre-built ATT&CK technique tests (Red Canary)
|
|
352
|
+
- **CALDERA**: Automated adversary emulation (MITRE)
|
|
353
|
+
- **APT Simulator**: Batch scripts simulating APT behavior
|
|
354
|
+
|
|
355
|
+
### Exploitation Frameworks
|
|
356
|
+
- **Metasploit**: Comprehensive exploit database
|
|
357
|
+
- **Covenant**: .NET C2 framework
|
|
358
|
+
- **Merlin**: Go-based post-exploitation platform
|
|
359
|
+
|
|
360
|
+
### Credential Attacks
|
|
361
|
+
- **Mimikatz**: Extract plaintext passwords, hashes, Kerberos tickets
|
|
362
|
+
- **BloodHound**: Active Directory attack path mapping
|
|
363
|
+
- **Rubeus**: Kerberos abuse toolkit
|
|
364
|
+
- **Impacket**: Python classes for network protocols
|
|
365
|
+
|
|
366
|
+
### Phishing & Social Engineering
|
|
367
|
+
- **Gophish**: Open-source phishing framework
|
|
368
|
+
- **Social-Engineer Toolkit (SET)**: Phishing, credential harvesting
|
|
369
|
+
- **EvilNginx**: Adversary-in-the-middle phishing framework
|
|
370
|
+
|
|
371
|
+
### OSINT & Reconnaissance
|
|
372
|
+
- **theHarvester**: Email, domain, subdomain enumeration
|
|
373
|
+
- **Shodan**: Search engine for internet-connected devices
|
|
374
|
+
- **Amass**: DNS enumeration and network mapping (OWASP)
|
|
375
|
+
- **SpiderFoot**: Automated OSINT collection
|
|
376
|
+
|
|
377
|
+
## Critical Reminders
|
|
378
|
+
|
|
379
|
+
- **MITRE ATT&CK is the Standard**: Map all activities to ATT&CK for interoperability
|
|
380
|
+
- **Stealth is Key**: Avoid detection to test realistic adversary scenarios
|
|
381
|
+
- **Document Everything**: Comprehensive evidence is essential for value delivery
|
|
382
|
+
- **Purple Team for Learning**: Collaborative exercises accelerate organizational improvement
|
|
383
|
+
- **Authorization First**: Never conduct red team activities without explicit written authorization
|