Skip to content

A collection of breach and post-exploitation kata for the red teamer to constantly train to maintain proficiency.

Notifications You must be signed in to change notification settings

malcomvetter/kata

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 

Repository files navigation

Breach Kata

Kata are a single unit of choreographed movements that are trained repetitively in martial arts so the student can acquire mastery of the art. This term has also been applied to programming (cyber dojo). In this context, these kata are for steps in the exploit chain of a network breach (i.e. red teaming or penetration testing).

These are single units of movement that should become second nature for the penetration tester. These could also make good basic technical interview questions for a red team role.

To perform the kata, have a training partner setup a lab environment using a variation discussed below and execute the sequence.

Post-Exploitation

Persistence

  1. Establish in-memory persistence from a shell that opens in an ephemeral process which dies within 5 seconds. Practice variations include: Operating Systems (Windows, *nix, Mac) and context (userland vs privileged).
  2. Establish on-disk persistence from a currently stable in-memory shell. Practice variations include: Operating System (Windows, *nix, Mac), context (userland vs privileged), and available writable directories (e.g. suppose the primary partition is full or unresponsive).
  3. Establish a secondary communications channel (different from the currently executing shell on the target host). Practice Variations include: host role (Server vs. User endpoint/desktop), Operating System (Windows, *nix, Mac) and egress traffic filtering policies, for example: (let creativity be the limit) all outbound traffic permitted, TCP port 443 outbound without protocol validation, HTTPS full proxy decryption, etc.

Lateral Movement

  1. Move from Windows host A to Windows host B. Variations include protocol (RDP, SMB, WMI, etc.) and vulnerability exploitation (e.g. MS08-067, pass the hash).
  2. Move from Windows host A to Linux host B. Variations include protocol (e.g. SSH, SMB, NFS, etc.)
  3. Move from Linux host A to Windows host B. Variations include protocol (e.g. SMB/RPC, RDP) and vulnerability exploitation.
  4. Move from Mac desktop host A to a secondary host B. Variations include target OS (Windows, *nix, another Mac) and protocol.

Privilege Escalation

  1. Within the OS, escalate from a userland process to administrator. Variations include OS (Windows, *nix, Mac), discovered credentials, UAC Bypass, file permissions, service misconfiguration, etc.
  2. Within an application, escalate from user to admin. Variations include client side policy enforcement, forced browsing, direct object reference, information leak, XSS/CSRF an administrator, etc.
  3. Within an enterprise network, escalate from single host to many. Variations include credential discovery (e.g. Mimikatz, internal CA certificate, admin password in text file, social engineer an administrator while keylogging, etc.), vulnerability exploitation (missing patch, misconfigured file permissions), and detection controls in play.

About

A collection of breach and post-exploitation kata for the red teamer to constantly train to maintain proficiency.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published