Astute Red Teaming

Basic Cross-Platform Ops

Study the methods of attack and defense and apply it to real-world scenarios via hands-on labs. We share with you the tactics, techniques, and procedures (TTPs) used in the wild and help you employ this knowledge in defense and detection of cyber attacks.

astute-red-teaming.png

Training teaches red team operators how to do the following:

  • Setup Voodoo for Red Team engagements.

  • Gain Initial Access to Target Networks via Voodoo.

  • Leverage a Socks Proxy to Access Systems within the Target Network via a Pivot.

  • Easily Escalate Privileges on endpoints.

  • Pivoting deep into networks via Cross Platform (Windows, Linux, etc.) multi-hop chains.

  • And much more!

See our Voodoo page for more details on the Voodoo Pro feature set.