This guide walks through a typical red team operation lifecycle, from initial access through post-operation cleanup.
Assumptions
- Signed legal authorization from executive leadership
- Defined scope and boundaries of testing
- Rules of engagement documented and approved
- Emergency contact procedures established
- Coordination points with blue team leadership (if applicable)
- Data handling agreements for any information accessed
Operational Philosophy
Effective red team operations require:
- Stealth over speed: Prioritize remaining undetected to test detection capabilities fully
- Realistic simulation: Use TTPs that mirror actual adversary behavior
- Objective-driven: Focus on achieving specific goals (domain compromise, data access, etc.)
- Thorough documentation: Maintain detailed logs for post-engagement reporting
- Ethical boundaries: Operate within scope and avoid causing actual harm
- Continuous adaptation: Adjust tactics based on defensive responses
Pre-Engagement Preparation
Infrastructure Setup
- Deploy team server on VPS with proper OPSEC
- Configure domain fronting or CDN for C2 infrastructure
- Create custom malleable C2 profile mimicking legitimate traffic (Office365, Google, etc.)
- Set up redirectors to obscure team server location
- Prepare phishing infrastructure (domains, email accounts)
Payload Preparation
- Generate Cobalt Strike raw beacon payloads
- Use Outflank’s Beacon Booster tool for enhanced evasion.
- Consider using the In-Phase builder to generate the phishing artifacts.
- Test against target’s known security products in isolated environment
- Prepare multiple delivery methods (macros, HTA, shortcut files, DLL side-loading)
- Create decoy documents relevant to target organization
- Obfuscate payloads to evade signature-based detection
Lifecycle Phases
Phase 1: Initial Access
Reconnaissance
- Gather OSINT on target organization
- Identify key personnel for spear-phishing
- Map external attack surface (email servers, VPN, web applications)
- Enumerate publicly exposed systems and services
Delivery
- Craft convincing spear-phishing emails with pretext
- Attach weaponized documents containing Cobalt Strike payload
- Alternative vectors: LinkedIn messages with malicious links, compromised vendor accounts
- Monitor for beacon callbacks on team server
Establishing Foothold
- Receive initial beacon callback
- Verify connection and system information
- Assess security posture (AV/EDR running, logging levels)
- Establish secondary C2 channel as backup
Phase 2: Persistence
Immediate Actions
- Migrate beacon to more stable process (explorer.exe, svchost.exe)
- Use Outflank’s process injection techniques for evasion:
- Create persistence mechanism:
- Use Outflank’s Sideload Trigger to find DLL hijacking candidates
Beacon Management
- Configure appropriate sleep/jitter times based on environment
- Use SMB beacons for internal pivoting (no direct internet connection)
- Deploy multiple persistence methods across different systems
Phase 3: Privilege Escalation
Local Privilege Escalation
- Identify exploitable services, misconfigurations
- Exploit kernel vulnerabilities if necessary
- Use elevate commands in Cobalt Strike (UAC bypass, exploit modules)
Credential Harvesting
- Use Outflank’s credential pack:
- DumpertNG for advanced LSASS dumping using process snapshot technique
- KernelKatz for credential extraction by leveraging a kernel driver.
- Extract credentials from memory, registry, files
- Capture password hashes for pass-the-hash attacks
- Keylog high-value targets to capture credentials
- Search for credentials in files, scripts, configuration files
Phase 4: Lateral Movement
Internal Reconnaissance
- Enumerate domain users, groups, computers
- Identify domain admins and privileged accounts
- Map network topology and trust relationships
- Locate high-value targets (file servers, databases, domain controllers)
Movement Techniques
- Use pass-the-hash with captured NTLM hashes
- Pass-the-ticket with Kerberos tickets
- PSExec to deploy beacons on remote systems
- RDP with stolen credentials for interactive access
- Abuse SMB to deploy beacons through named pipes
- Use Outflank’s Shovel NG.
- Deploy beacons on newly compromised systems
- Chain beacons through pivoting for segmented networks
- Maintain access to multiple systems for redundancy
Phase 5: Domain Dominance
Domain Controller Compromise
- Target domain controller systems
- Extract domain credentials using Outflank’s Credential Pack
- Create Golden/Silver tickets for persistent domain access
Administrative Access
- Compromise domain admin accounts
- Add backdoor accounts to privileged groups
- Deploy beacons on critical infrastructure
- Establish multiple persistence mechanisms at domain level
Phase 6: Data Collection
Target Identification
- Locate sensitive data repositories
- Identify databases, file shares, SharePoint sites
- Search for documents containing sensitive keywords
- Access email servers and archives
Data Staging
- Download target files to compromised systems
- Compress and encrypt data for exfiltration
- Stage data in obscure locations
- Use Cobalt Strike’s file browser to navigate and download
Phase 7: Exfiltration Simulation
Covert Channels
- Exfiltrate via HTTPS C2 channel (blends with normal traffic)
- Use DNS tunneling for highly restricted networks
- Stage data on cloud storage (OneDrive, Dropbox) using legitimate accounts
- Upload to external servers via encrypted connections
Phase 8: Covering Tracks
Log Manipulation
- Clear relevant Windows Event Logs
- Remove artifacts from compromised systems
- Delete staged files and tools
Maintaining Access
- Keep selective persistence mechanisms active
- Use stealthy communication profiles
- Prepare for blue team response and maintain access despite remediation attempts
Operational Security (OPSEC)
Communication Discipline
- Use malleable C2 profiles that mimic legitimate traffic
- Randomize beacon callbacks with sleep/jitter
- Avoid patterns in C2 communication
- Use domain fronting or CDN to obscure C2 infrastructure
Evasion Techniques
- Process injection into trusted processes
- Execute in memory (fileless)
- Use living-off-the-land binaries (LOLBins)
- Avoid dropping files to disk when possible
- Disable command logging in Cobalt Strike
- Integrate Outflank Security Tooling for advanced evasion.
- Watch for signs of detection (antivirus alerts, beacons dying)
- Monitor target’s security blog/Twitter for incident response activity
- Adjust TTPs if detection occurs
- Have contingency plans for burned infrastructure
Documentation
Maintain Operation Log
- Document all compromised systems
- Record credentials obtained
- Track lateral movement path
- Screenshot critical achievements
- Time-stamp all activities
Evidence Collection
- Screenshot domain admin access
- Document path to domain controller
- Capture proof of sensitive data access
- Record all persistence mechanisms deployed
- Log all systems with active beacons
Post-Operation
Cleanup Coordination
- Provide list of all compromised systems
- Document all persistence mechanisms for removal
- Share IOCs generated during operation
- Remove beacons and artifacts
- Restore any modified configurations
- Remove any Outflank tooling artifacts
Report Preparation
- Create detailed attack path diagram
- Document techniques that succeeded/failed
- List credentials compromised
- Provide timeline of activities
- Include recommendations from operator perspective
- Document effectiveness of Outflank evasion techniques vs. target’s security stack
Key Outflank Tools for Cobalt Strike Operations
C2-Tool-Collection
- Custom process injection techniques
- In-Phase Builder: Initial payload stager
Credential Access
- KernelKatz: Alternative credential extraction method
Execution & Evasion
- Beacon Object Files (BOFs): In-process execution without spawning
- Sharpfuscator: Obfuscate .NET tools to improve in-memory evasion
- AceLdr: Custom reflective loader for enhanced evasion
- Credential Pack: Stealthy credential harvesting
- Multiple lateral movement Tools
- Custom Kerberos abuse tools
Benefits of Integration
- Significantly reduced detection rates
- Bypass modern EDR solutions
- Minimize forensic artifacts
- Execute without spawning suspicious processes
- Evade memory scanning and behavioral detection
Equip your red teamers with top-of-the-line toolkits