The Red Team (Pentesters) represent the first line of offense in the security operations center. It is the role of the Red Team to identify potential entry points of an attacker on your network. Once inside the Red Team will perform various attack types to identify vulnerabilities in stop gaps across the network. However, performing more advanced attacks requires hands-on training within a real enterprise network. As a result, we have released 3 new advanced attack scenarios to help train your red team to work more effectively, identifying new attack types that may work against your network.

New Red Team Training Scenarios

Kerberoasting

Kerberos (AKA Cerberus) in Greek mythology guards the gates to the underworld. He is a big 3 headed dog with a really bad temper. The same way Cerberus defends the gates to the underworld so does the Kerberos computer network authentication protocol which requires 3 entities to authenticate and has an excellent track record of making computing safer. In this red team training exercise, trainees will need to bypass the guards by modifying the Kerberos ticket loaded in memory in order to get full access to the underworld – the domain MSSQL server which has only local user privileges and no permissions.

It is important that your penetration testers know common hacking techniques, such as a forged service authentication ticket, or a silver ticket. Like its cousin, the Golden Ticket, the Silver Ticket is even nastier and stealthier. Ensuring your Red Team can deploy this technique will also ensure that your network is safe from the Silver Ticket. Your team will also learn how to deploy PowerShell scripts learn the fundamentals of Kerberos to breach your network.

XSS Cookie Stealer

As one of the few vulnerabilities that have made it on to every OWASP Top 10 List of most critical web application security risks, the Cross-Site Scripting vulnerability allows an attacker to execute scripts in the victim`s browser to hijack user sessions, deface websites or redirect the user to a malicious site. In this red team training exercise, the trainees will need to exploit the XSS vulnerability to gain administrative access to a website. Trainees will gain experience performing XSS attacks, learn authentication methods used in web apps, and deploy vulnerability scanners, gaining important experience to test your network.

Red MiTM

The effects of ARP spoofing attacks can have serious implications for enterprises. The technique can be used for DDoS attacks, sensitive information theft, session hijacking, and MiTM attacks to intercept and modify traffic between victims. In this red scenario, the trainee will use ARP and DNS spoofing as an MiTM attack in order to successfully deploy malicious payload on the target user while maintaining minimal footprint in the network. Red Team trainees will gain a better understanding of techniques to exploit DNS protocols as well as hands-on experience performing MiTM DNS spoofing attacks.

Experience a Kerberoasting scenario on Cyberbit Range Register for a free training session

See a Cyber Range Training Session in Action