Initial Access

Explore the different techniques to gain initial access to a target system and network from a Red Teamer’s perspective.
In this module, we will cover the different strategies to gain access to a system in a simulated target network. Explore a variety of popular passive reconnaissance tools, learn about techniques to weaponize files, attack passwords and logins, and practice sending a phishing campaign to exploit a system in our simulated labs.

0%
Red Team Recon
Learn how to use DNS, advanced searching, Recon-ng, and Maltego to collect information about your target.
0%
Weaponization
Understand and explore common red teaming weaponization techniques. You will learn to build custom payloads using common methods seen in the industry to get initial access.
0%
Password Attacks
This room introduces the fundamental techniques to perform a successful password attack against various services and scenarios.
0%
Phishing
Learn what phishing is and why it's important to a red team engagement. You will set up phishing infrastructure, write a convincing phishing email and try to trick your target into opening your email in a real-world simulation.
What are modules?
A learning pathway is made up of modules, and a module is made of bite-sized rooms (think of a room like a mini security lab).
