Skip to main contentSkip to main content
Room Banner
Back to all walkthroughs
Room Icon

Weaponization

Premium room

Understand and explore common red teaming weaponization techniques. You will learn to build custom payloads using common methods seen in the industry to get initial access.

medium

120 min

40,006

User profile photo.

To access material, start machines and answer questions login.

In this room, we will be discussing different techniques used for weaponization. 

Cyber Kill Chain phases

What is Weaponization

Weaponization is the second stage of the Cyber Kill Chain model. In this stage, the attacker generates and develops their own malicious code using deliverable payloads such as word documents, PDFs, etc. [1 (opens in new tab)]. The weaponization stage aims to use the malicious weapon to exploit the target machine and gain initial access.

Most organizations have Windows running, which is going to be a likely target. An organization's environment policy often blocks downloading and executing .exe files to avoid security violations. Therefore, red teamers rely upon building custom payloads sent via various channels such as campaigns, , browser or software exploitation, USB, or web methods.

The following graph is an example of weaponization, where a crafted custom PDF or Microsoft Office document is used to deliver a malicious payload. The custom payload is configured to connect back to the command and control environment of the red team infrastructure.

For more information about red team toolkits, please visit the following: a GitHub repository (opens in new tab) that has it all, including initial access, payload development, delivery methods, and others.

Most organizations block or monitor the execution of .exe files within their controlled environment. For that reason, red teamers rely on executing payloads using other techniques, such as built-in windows scripting technologies. Therefore, this task focuses on various popular and effective scripting techniques, including:

  • The Windows Script Host (WSH)
  • An HTML Application ()
  • Visual Basic Applications (VBA)
  • (PSH)
Answer the questions below
Let's deploy the target machine in the next task, and we'll get started with the Windows Script Host technique in the subsequent task!

Ready to learn Cyber Security?

The Weaponization room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.

Already have an account? Log in

We use cookies to ensure you get the best user experience. For more information see our cookie policy.