Red team tactics principles based on MITRE ATT&CK. Attack phases, detection evasion, reporting.
A red team engagement is a controlled attack. The goal is to find what a real attacker would find — before they do.
⚠️ These techniques are for authorized security testing only. Unauthorized use is illegal.
Before any testing activity:
No authorization = no testing.
Passive and active information gathering before touching the target.
Passive (no target contact):
nslookup, dig, certificate transparency logsActive (target is contacted):
nmap -sV -sC <target>whatweb, wappalyzeramass, subfinderHow does an attacker get their first foothold?
Common vectors:
searchsploit, nuclei)Maintaining access after initial compromise:
Moving from initial foothold to higher-value targets:
Getting data out without triggering alerts:
| Target | What to Test |
|---|---|
| Web applications | OWASP Top 10, auth bypass, IDOR, SSRF |
| APIs | Object-level authorization, mass assignment, rate limiting |
| Authentication | Brute force protection, token entropy, password reset flow |
| Secrets | Exposed env files, git history, CI/CD environment variables |
| Third-party integrations | Webhook validation, OAuth redirect URI validation |
| Infrastructure | Open S3 buckets, exposed admin ports, default credentials |
When testing detection capabilities:
# Red Team Report: [Engagement Name]
## Executive Summary
[2–3 sentences: what was tested, biggest risk found, business impact]
## Scope
[Systems tested, date range, authorization reference]
## Critical Findings
### CRIT-01: [Title]
**Risk:** Critical
**CVSS:** 9.8
**Description:** [What the vulnerability is]
**Evidence:** [Screenshot, payload, response]
**Impact:** [What an attacker could do]
**Remediation:** [Specific fix with code or config example]
## Attack Narrative
[Chronological story of the full attack path from initial access to objective]
## Remediation Priority
|Finding|Severity|Fix By|
|---|---|---|
When this skill produces a recommendation or design decision, structure your output as:
━━━ Red Team Tactics Recommendation ━━━━━━━━━━━━━━━━
Decision: [what was chosen / proposed]
Rationale: [why — one concise line]
Trade-offs: [what is consciously accepted]
Next action: [concrete next step for the user]
─────────────────────────────────────────────────
Pre-Flight: ✅ All checks passed
or ❌ [blocking item that must be resolved first]