Adversary Tactics - Identity-driven Offensive Tradecraft

Adversary Tactics - Identity-driven Offensive Tradecraft

ATIDOT-Banner

Important

After reading the material, use the following resources to prepare for your specific delivery:

Operating via C2

Effective red team operations require a unified platform for all team members. In this course, you can use either Mythic or Cobalt Strike as your Command and Control (C2) platform. You’re also welcome to use other C2 platforms you are familiar with or wish to explore.

Mythic

Mythic is a popular open-source C2 platform with various agents and capabilities. The Apollo agent is preferred for our AT:IDOT lab.

Cobalt Strike

If you’re new to Cobalt Strike, we highly recommend reviewing Raphael Mudge’s free online course on Red Team Operations. This course covers everything you need to get started and prepare for the AT:IDOT lab.

For more advanced topics and techniques, check out:

Windows and Active Directory

Most environments you’ll encounter as a red team operator use Microsoft Active Directory. To prepare for AT:IDOT, review the basics of Active Directory and common attack methods, including Credential Shuffle, Kerberoasting, and Golden/Silver Tickets.

Tunneling and Proxying Traffic

Complex networks often require tunneling traffic via SSH and using SOCKS proxies. Proficiency in these skills is essential for the AT:IDOT lab.