Book

Hands-On Red Team Tactics

Red teaming is a process in which you use an attacker-like approach to secure your system, data, and network from getting breached. The main goal of the book is to equip the readers with the means to a smooth transition from a pen tester to a red teamer by focusing on the uncommon yet effective methods in a red teaming activity.

Offered byPackt Logo

Difficulty Level
Intermediate
Completion Time
16h approx.
Language
English
Certification
Not available

About Course

Book Content

chapters 16h total length

1. Red-Teaming and Pentesting
2. Pentesting 2018
3. Foreplay - Metasploit Basics
4. Getting Started with Cobalt Strike
5. ./ReverseShell
6. Pivoting
7. Age of Empire - The Beginning
8. Age of Empire - Owning Domain Controllers
9. Cobalt Strike - Red Team Operations
10. C2 - Master of Puppets
11. Obfuscating C2s - Introducing Redirectors
12. Achieving Persistence
13. Data Exfiltration

On this page

Ready to Train Your Team?

Need training for your whole team? Get bulk pricing, LMS integration, and dedicated support.

Trusted by Leading Organizations Worldwide

Join thousands of companies that trust Calibr to power their learning and development initiatives.

Chalet Hotels logo
Pernod Ricard logo
ProMobi logo
Metrique logo
K Raheja Corp logo
Spyne.AI logo
VuNet Systems logo
Procurement Partners logo
vEngage.AI logo
1218 Global logo
TRADEJINI logo
Oben Electric logo
IIT STartups logo
EdTech Digit logo
MindSkillz logo
NewportMed logo

Request Access For Your Organization

Start training your team in minutes!

No credit card required

Related Resources