Performing the steps to compromise a system
One of the main tasks of the Blue Team is to understand the cyber kill chain fully, and how it can be used against an organization’s infrastructure. The Red Team, on the other hand, can use simulation exercises to identify breaches, and the results of this exercise can help to enhance the overall security posture of the organization.
The core macro steps to be followed are:
- Deploy the payloads
- Compromise the operations system
- Compromise the remote system
- Compromise the web-based system
Note that these steps will vary according to the attacker’s mission, or the Red Team’s target exercise. The intent here is to give you a core plan that you can customize according to your organization’s needs.
Deploying payloads
Assuming that the entire public recon process was done to identify the target that you want to attack, you now need to build a payload that can exploit an...