What is this?

This is publicly accessible personal notes at https://ired.team and https://github.com/mantvydasb/RedTeam-Tactics-and-Techniques about my pentesting / red teaming experiments in a controlled environment that involve playing with various tools and techniques used by penetration testers, red teams and actual adversaries.

  • Do not take everything or anything in these notes for granted

  • Do not expect the notes to be very detailed or covering the techniques or the artifacts they produce in full

  • Expect to find mistakes in the notes

  • Always consult additional resources

The following sub-pages of this page will explore some of the common offensive security techniques involving gaining code execution, lateral movement, persistence and more. This is my way of learning things - I learn by doing, repeating and taking notes.

Most of these techniques are discovered by other security researchers and I do not claim their ownership. I try to reference the sources I use the best I can, but if you think I've missed something, please get in touch and I will fix it immediately.

The Goal

The goal of this project is simple - read other researchers work, execute some common/uncommon attacking techniques in a lab environment and:

  • understand how the attacks can be performed

  • write code to further the understanding of some of the tools and techniques

  • see what most common artifacts the techniques leave behind

  • try out various industry tools and become more profficient in using them

  • take notes for future reference


Follow me on twitter: