100 Days of Red Team
Subscribe
Sign in
Home
Red Team Training
GitHub
YouTube
Uday Mittal's Substack
About
Leveraging WebSockets for Command and Control (C2) Communications
A proof of concept to explore how WebSockets can be leveraged for C2 communications and should they be?
Sep 19
•
Uday Mittal
Most Popular
View all
Using Havoc C2 to bypass UAC
Feb 16
•
Uday Mittal
1
Creating a simple beacon object file for Havoc C2
Feb 23
•
Uday Mittal
2
2
Using PassGAN for effective password cracking
Apr 1
•
Uday Mittal
Red Team Infrastructure - Deploying Havoc C2 via Terraform
May 17
•
Uday Mittal
2
Recent posts
View all
WebSockets handshake for red team professionals
A simple guide to understanding the WebSocket handshake and how red teams can leverage it.
Sep 17
•
Uday Mittal
1
Using Velociraptor as C2
Velociraptor repurposed as C2: explore its powers, risks, and real-world misuse in red team operations.
Aug 29
•
Uday Mittal
2
1
Misusing SaaS app integrations for persistence
Learn how attackers abuse SaaS integrations for hidden persistence and re-entry into enterprise environments.
Aug 28
•
Uday Mittal
1
Red Team perspective on AWS VPC Lattice
Exploring AWS VPC Lattice and how attackers could abuse it for stealth, movement, and hidden access paths.
Aug 27
•
Uday Mittal
1
The Art of Pretext: Building better backstories for social engineering - Part 3
Learn how to create research-backed, believable pretexts for social engineering ops.
Jun 15
•
Uday Mittal
1
The Art of Pretext: Building better backstories for social engineering - Part 2
Explore the key elements of a strong pretext that help red teams create convincing and resilient personas.
Jun 14
•
Uday Mittal
1
The Art of Pretext: Building better backstories for social engineering - Part 1
Learn why strong pretexts are vital for social engineering success and discover reasons why certain pretexts fail.
Jun 2
•
Uday Mittal
Abusing the AWS metadata API for privilege escalation
Learn how to leverage the AWS Metadata API to extract IAM role credentials and escalate privileges after compromising an EC2 instance.
Jun 1
•
Uday Mittal
1
See all
Fundamentals
View all
The role of deception in red team ops
Learn how red teams leverage deception for their tradecraft.
Mar 21
•
Uday Mittal
1
Evaluating security architecture from red team's perspective
Learn how to assess security architecture from a red team's perspective.
Mar 20
•
Uday Mittal
What is purple teaming?
Let's understand what purple teaming is and how it is tied to red team operations.
Mar 18
•
Uday Mittal
Applying Outside-In thinking to red team operations
Learn how to use Outside-In thinking strategy for red team operations.
Mar 17
•
Uday Mittal
Applying 4 Ways of Seeing to red team operations
Learn how the 4 Ways of Seeing technique can be used for red team operations to understand security threats from multiple perspectives.
Mar 16
•
Uday Mittal
What most red team professionals won't tell you
Read this before you aspire to become a red team professional.
Mar 10
•
Uday Mittal
1
What is red teaming?
Let's understand what it truly means to red team something.
Mar 8
•
Uday Mittal
The Red Team Pyramid of Pain
A model showing how progressively advanced red team tradecraft makes it harder for defenders to detect and respond.
Mar 7
•
Uday Mittal
1
Communicating results of a red team engagement
How to write a report for a red team engagement and considerations to keep in mind while creating the report.
Mar 6
•
Uday Mittal
Direct and indirect syscalls for red team operations
Learn what are direct and indirect syscalls and their differences for red team tradecraft.
Feb 24
•
Uday Mittal
Role of threat intelligence in a red team engagement
Learn how red teams leverage threat intelligence for an impactful assessment.
Feb 7
•
Uday Mittal
1
How to ensure that the red team is setup for success?
Learn about six best practices for the success of a red team.
Feb 3
•
Uday Mittal
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts