Safe Red Team Infrastructure

This waterpark slide has been my analog for this Red Team infrastructure model
A simple model that works for consulting or internal corporate Red Teams.

Domain Fronting

A more advanced consulting Red Team model with Domain Fronting as an option.

IP Laundry

An internal corporate Red Team model to keep C2/data on-premise but simulate external threat actors.

Credential Phishes

Tradecraft Considerations

--

--

--

Red Team Leader at Fortune 1. I left my clever profile in my other social network: https://www.linkedin.com/in/malcomvetter

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

EKSUTURA KUREDITO: API, HTML, Authentication Blog

Dynamically updating a configmap with the Kubernetes cluster name

The full script is listed below embedded in the yaml’s

Go from Reactive to Resilient this Holiday Season

Building Swift Barcode Reader with DBR 5.2 for Linux

15 Interview Questions you might get in an interview as a Software Engineer

Introducing Katalon Store — An All-new Plugin Marketplace

Company Update: December/January 2018/2019

A tale of two SaaS support models

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Tim MalcomVetter

Tim MalcomVetter

Red Team Leader at Fortune 1. I left my clever profile in my other social network: https://www.linkedin.com/in/malcomvetter

More from Medium

Security Advisory: Critical Linux Vulnerability

Active Directory Certificate Services: Domain Dominance

Log4j/Log4Shell Vulnerability Scanning and Exploit Detection in Uptycs osquery

Let me tell you about SSH..