red-team-tactics

Compare original and translation side by side

🇺🇸

Original

English
🇨🇳

Translation

Chinese

Red Team Tactics

Red Team 战术

Adversary simulation principles based on MITRE ATT&CK framework.

基于MITRE ATT&CK框架的对手模拟原则。

1. MITRE ATT&CK Phases

1. MITRE ATT&CK 攻击阶段

Attack Lifecycle

攻击生命周期

RECONNAISSANCE → INITIAL ACCESS → EXECUTION → PERSISTENCE
       ↓              ↓              ↓            ↓
   PRIVILEGE ESC → DEFENSE EVASION → CRED ACCESS → DISCOVERY
       ↓              ↓              ↓            ↓
LATERAL MOVEMENT → COLLECTION → C2 → EXFILTRATION → IMPACT
RECONNAISSANCE → INITIAL ACCESS → EXECUTION → PERSISTENCE
       ↓              ↓              ↓            ↓
   PRIVILEGE ESC → DEFENSE EVASION → CRED ACCESS → DISCOVERY
       ↓              ↓              ↓            ↓
LATERAL MOVEMENT → COLLECTION → C2 → EXFILTRATION → IMPACT

Phase Objectives

阶段目标

PhaseObjective
ReconMap attack surface
Initial AccessGet first foothold
ExecutionRun code on target
PersistenceSurvive reboots
Privilege EscalationGet admin/root
Defense EvasionAvoid detection
Credential AccessHarvest credentials
DiscoveryMap internal network
Lateral MovementSpread to other systems
CollectionGather target data
C2Maintain command channel
ExfiltrationExtract data

PhaseObjective
Recon测绘攻击面
Initial Access获取初始立足点
Execution在目标系统上运行代码
Persistence系统重启后仍保持访问权限
Privilege Escalation获取管理员/根权限
Defense Evasion规避检测
Credential Access获取凭证
Discovery测绘内部网络
Lateral Movement横向移动至其他系统
Collection收集目标数据
C2维持命令与控制通道
Exfiltration提取数据

2. Reconnaissance Principles

2. 侦察原则

Passive vs Active

被动侦察 vs 主动侦察

TypeTrade-off
PassiveNo target contact, limited info
ActiveDirect contact, more detection risk
TypeTrade-off
Passive不接触目标,获取信息有限
Active直接接触目标,被检测风险更高

Information Targets

信息收集目标

CategoryValue
Technology stackAttack vector selection
Employee infoSocial engineering
Network rangesScanning scope
Third partiesSupply chain attack

CategoryValue
Technology stack选择攻击向量
Employee info社会工程学利用
Network ranges确定扫描范围
Third parties供应链攻击

3. Initial Access Vectors

3. 初始访问向量

Selection Criteria

选择标准

VectorWhen to Use
PhishingHuman target, email access
Public exploitsVulnerable services exposed
Valid credentialsLeaked or cracked
Supply chainThird-party access

VectorWhen to Use
Phishing针对人员目标,可访问邮箱时使用
Public exploits存在暴露的易受攻击服务时使用
Valid credentials存在泄露或破解的凭证时使用
Supply chain可通过第三方访问时使用

4. Privilege Escalation Principles

4. 权限提升原则

Windows Targets

Windows 目标

CheckOpportunity
Unquoted service pathsWrite to path
Weak service permissionsModify service
Token privilegesAbuse SeDebug, etc.
Stored credentialsHarvest
CheckOpportunity
Unquoted service paths写入路径
Weak service permissions修改服务
Token privileges滥用SeDebug等权限
Stored credentials获取存储的凭证

Linux Targets

Linux 目标

CheckOpportunity
SUID binariesExecute as owner
Sudo misconfigurationCommand execution
Kernel vulnerabilitiesKernel exploits
Cron jobsWritable scripts

CheckOpportunity
SUID binaries以所有者身份执行
Sudo misconfiguration执行命令
Kernel vulnerabilities内核漏洞利用
Cron jobs可写入的脚本

5. Defense Evasion Principles

5. 防御规避原则

Key Techniques

核心技术

TechniquePurpose
LOLBinsUse legitimate tools
ObfuscationHide malicious code
TimestompingHide file modifications
Log clearingRemove evidence
TechniquePurpose
LOLBins使用合法工具
Obfuscation隐藏恶意代码
Timestomping隐藏文件修改痕迹
Log clearing清除证据

Operational Security

操作安全

  • Work during business hours
  • Mimic legitimate traffic patterns
  • Use encrypted channels
  • Blend with normal behavior

  • 在工作时间开展操作
  • 模仿合法流量模式
  • 使用加密通道
  • 融入正常行为

6. Lateral Movement Principles

6. 横向移动原则

Credential Types

凭证类型

TypeUse
PasswordStandard auth
HashPass-the-hash
TicketPass-the-ticket
CertificateCertificate auth
TypeUse
Password标准身份验证
Hash哈希传递(Pass-the-hash)
Ticket票据传递(Pass-the-ticket)
Certificate证书身份验证

Movement Paths

移动路径

  • Admin shares
  • Remote services (RDP, SSH, WinRM)
  • Exploitation of internal services

  • 管理员共享目录
  • 远程服务(RDP、SSH、WinRM)
  • 内部服务漏洞利用

7. Active Directory Attacks

7. Active Directory 攻击

Attack Categories

攻击类别

AttackTarget
KerberoastingService account passwords
AS-REP RoastingAccounts without pre-auth
DCSyncDomain credentials
Golden TicketPersistent domain access

AttackTarget
Kerberoasting服务账户密码
AS-REP Roasting无预认证的账户
DCSync域凭证
Golden Ticket持久化域访问权限

8. Reporting Principles

8. 报告原则

Attack Narrative

攻击叙事

Document the full attack chain:
  1. How initial access was gained
  2. What techniques were used
  3. What objectives were achieved
  4. Where detection failed
记录完整攻击链:
  1. 如何获取初始访问权限
  2. 使用了哪些技术
  3. 达成了哪些目标
  4. 检测环节在何处失效

Detection Gaps

检测缺口

For each successful technique:
  • What should have detected it?
  • Why didn't detection work?
  • How to improve detection

对于每个成功使用的技术:
  • 本应通过什么方式检测到它?
  • 为什么检测没有生效?
  • 如何改进检测机制

9. Ethical Boundaries

9. 伦理边界

Always

必须遵守

  • Stay within scope
  • Minimize impact
  • Report immediately if real threat found
  • Document all actions
  • 严格在测试范围内操作
  • 尽可能降低影响
  • 若发现真实威胁立即报告
  • 记录所有操作

Never

绝对禁止

  • Destroy production data
  • Cause denial of service (unless scoped)
  • Access beyond proof of concept
  • Retain sensitive data

  • 销毁生产数据
  • 造成拒绝服务(除非在测试范围内)
  • 超出概念验证的访问范围
  • 留存敏感数据

10. Anti-Patterns

10. 反模式

❌ Don't✅ Do
Rush to exploitationFollow methodology
Cause damageMinimize impact
Skip reportingDocument everything
Ignore scopeStay within boundaries

Remember: Red team simulates attackers to improve defenses, not to cause harm.
❌ 禁止✅ 推荐
急于进行漏洞利用遵循方法论
造成破坏降低影响
跳过报告环节记录所有内容
无视测试范围严格遵守边界

谨记: Red Team的作用是模拟攻击者以提升防御能力,而非造成损害。