Penetration Testing mailing list archives
Re: Best attack strategy for a Red Team?
From: "Adriel T. Desautels" <ad_lists () netragard com>
Date: Tue, 10 Mar 2009 17:07:16 -0400
Take a look at my recent facebook entry on our blog. http://snosoft.blogspot.com . That might give you some ideas on how to SE your targets.
On Mar 10, 2009, at 2:11 PM, Scott wrote:
That's a good point. I've tried posting this to some private forums but there was no response. It's an acceptable risk the student teams could be members of this list and this seemed like the best resource for feedback on the topic. Frankly, I'm probably the least of their worries given the skill set of the other attack team members. Social Engineering has been harder to pull off since the teams all know what we look like but it's worked a few times before. Thank you for the feedback. Scott On Tue, Mar 10, 2009 at 12:44 PM, Adriel T. Desautels <ad_lists () netragard com> wrote:Well,For starters I wouldn't ask about it in public forum. How do you know if the defenders are reading this email list or not? If you take publicadvice who's to say that they won't build the defense first?That said, use Social Engineering to start... it works if you do itright. On Mar 9, 2009, at 1:55 PM, Scott wrote:Howdy folks! I'm part of a Red Team for the Mid-Atlantic region CCDC competition(Collegiate Cyber Defense Competition). There are some pretty talentedfolks on the team and I'm arguably the least experienced (for now). The short version explanation is that teams of college students are tasked with operating and defending a "corporate" network of systems ranging from web, email, DB, MS Domain servers, VoIP, and normalworkstations. They have to patch a wide variety of holes while keepingdesignated services available for scoring. The team with the mostuptime wins. Meanwhile, the red team is busy attacking these servicesalong with anything else we can get into and create havoc for the student teams. My question to all of you is what you would recommend for an attackstrategy here. In previous competitions it's been challenging to know where to start as there are many options. Should I find a hole and digin with backdoors, create new user accounts, take over the adminaccounts and lock out the student teams??? Technically the red team is supposed to bring down or deny access to the services the students arescored on (primary objective). There's always more going than thathowever. I'd like to stay focused when we go into the 3 day event thismonth so I need a plan. How would you do it if you didn't know more than possibly what types of systems you'll find on the target networks? Thanks. ScottAdriel T. Desautels ad_lists () netragard com -------------------------------------- Subscribe to our blog http://snosoft.blogspot.com
Adriel T. Desautels ad_lists () netragard com -------------------------------------- Subscribe to our blog http://snosoft.blogspot.com
Current thread:
- Best attack strategy for a Red Team? Scott (Mar 10)
- Message not available
- Re: Best attack strategy for a Red Team? Scott (Mar 12)
- Re: Best attack strategy for a Red Team? Mike Acker (Mar 15)
- Re: Best attack strategy for a Red Team? Scott (Mar 12)
- Message not available
- Message not available
- Re: Best attack strategy for a Red Team? Scott (Mar 12)
- Message not available
- Re: Best attack strategy for a Red Team? Scott (Mar 12)
- Re: Best attack strategy for a Red Team? sr. (Mar 15)
- Re: Best attack strategy for a Red Team? Scott (Mar 12)
- Re: Best attack strategy for a Red Team? Scott (Mar 12)
- Re: Best attack strategy for a Red Team? Adriel T. Desautels (Mar 12)
- Message not available
- Re: Best attack strategy for a Red Team? Adriel T. Desautels (Mar 15)
- <Possible follow-ups>
- Re: Best attack strategy for a Red Team? vijay . upadhyaya (Mar 12)
- Re: Best attack strategy for a Red Team? krymson (Mar 12)