Astute Red Teaming

Basic Cross-Platform Ops

Study the methods of attack and defense and apply it to real-world scenarios via hands-on labs. We share with you the tactics, techniques, and procedures (TTPs) used in the wild and help you employ this knowledge in defense and detection of cyber attacks.


Training teaches red team operators how to do the following:

  • Setup Voodoo for Red Team engagements.

  • Gain Initial Access to Target Networks via Voodoo.

  • Leverage a Socks Proxy to Access Systems within the Target Network via a Pivot.

  • Easily Escalate Privileges on endpoints.

  • Pivoting deep into networks via Cross Platform (Windows, Linux, etc.) multi-hop chains.

  • And much more!

See our Voodoo page for more details on the Voodoo Pro feature set.