Command & Control Mastery with Covenant C2: PART-I

This entry is part 11 of 22 in the series Red Team Engagements

Views: 56In the realm of cybersecurity, especially within red teaming and penetration testing, Command and Control (C2) frameworks are pivotal. They facilitate the management of compromised systems, enabling operators to execute commands, maintain persistence, and exfiltrate data. Among the various C2 frameworks available, Covenant C2 stands out due to its unique features and capabilities. 🔍 … Read more

Installing OpenBAS: The OpenSource Breach and Attack Simulation

This entry is part 12 of 22 in the series Red Team Engagements

Views: 96Introduction In today’s rapidly evolving cybersecurity landscape, organizations need robust tools to test their security posture and validate their defenses. OpenBAS (Open Breach and Attack Simulation) emerges as a powerful open-source platform that enables security teams to conduct comprehensive security exercises, simulate realistic attack scenarios, and assess organizational resilience against cyber threats. This guide … Read more

Metasploit Framework (MSFconsole) Cheatsheet

This entry is part 13 of 22 in the series Red Team Engagements

Views: 24Disclaimer: This post is created solely for educational and research purposes. The techniques, tools, and concepts discussed are intended to enhance cybersecurity awareness and skills by demonstrating how offensive security testing works. Unauthorized access to computer systems is a criminal offense and subject to severe penalties. Always practice these techniques in a controlled lab … Read more

RED Teaming: Mythic C2 Framework

This entry is part 14 of 22 in the series Red Team Engagements

Views: 73Disclaimer: This post is created solely for educational and research purposes. The techniques, tools, and concepts discussed are intended to enhance cybersecurity awareness and skills by demonstrating how offensive security testing works. Unauthorized access to computer systems is a criminal offense and subject to severe penalties. Always practice these techniques in a controlled lab environment or with explicit permission from the … Read more

The Bait Lab – Phishing Simulations, Practical Campaigns with GoPhish & Evilginx (PART: I)

This entry is part 15 of 22 in the series Red Team Engagements

Views: 31Disclaimer “This guide is for authorized testing in a controlled environment. Obtain written approval before sending any simulated emails.” Installing GoPhish on Ubuntu 24.04 GoPhish provides a complete platform to design, launch, and track phishing campaigns — making it the perfect entry point for building phishing simulations in a controlled red team lab. Phishing … Read more

The Bait Lab – Phishing Simulations, Practical Campaigns with GoPhish & Evilginx (PART: II)

This entry is part 16 of 22 in the series Red Team Engagements

Views: 14Disclaimer “This guide is for authorized testing in a controlled environment. Obtain written approval before sending any simulated emails.” SekurFinCorp: Phishing Simulation (Credential Capture via a Realistic Banking Lure) In Part 1 we covered installing and configuring GoPhish. This article walks through a complete phishing simulation: building user groups, crafting a realistic email template, … Read more