Red Teaming Overview
beginnerServer Side Attacks AND Client Side Attacks along with the Learnings from CTFβs , to know about Terminologies
owasp 10 Stages of Penetration Testing:
- Planning and Reconnaissance (Subdomain finding)
- Scanning and Enumeration
- Gaining Access
- Maintain Access
- Clearing Tracks
- Reporting
π§ 1. Planning and Reconnaissance
Objective: Understand the target and gather preliminary information.
βWhat did enumeration give me access to β and can I weaponize that with known CVEs or misconfig?β
Steps:
-
Define scope and goals
-
Assets in scope
-
Legal permissions
-
-
Identify target systems & services
- IP ranges, domains, cloud environments
-
Passive Reconnaissance
-
WHOIS, DNS records
-
Google dorking, public data leaks
-
-
Subdomain Enumeration π
-
Tools:
Sublist3r,Amass,Assetfinder,crt.sh -
Validate with DNS resolution
-
-
Open Source Intelligence (OSINT)
- Employee names, exposed credentials, social engineering angles
-
Technology Stack Fingerprinting
- Detect WAFs, CMS, frameworks
π 2. Scanning and Enumeration
Objective: Actively gather data on live systems and potential vulnerabilities.
Steps:
-
Port Scanning
-
Tools:
Nmap,Masscan -
Identify open ports/services
-
-
Service Version Detection
- Detect software versions, banners
-
Vulnerability Scanning
-
Tools:
Nessus,OpenVAS,Nikto,Nuclei -
Cross-reference with CVEs
-
-
Enumeration
-
SMB shares, SNMP data, LDAP, NetBIOS
-
Enumerate users, shares, software configs
-
-
Web Enumeration
-
Hidden directories (
Dirbuster,Gobuster) -
CMS plugins/themes
-
-
Brute Forcing
- Passwords, usernames (
Hydra,Medusa,Patator)
- Passwords, usernames (
π― 3. Gaining Access
Objective: Exploit vulnerabilities to obtain unauthorized access.
Steps:
-
Exploit Selection
-
Based on CVEs, misconfigurations, weak passwords
-
Check for public exploits (
Exploit-DB,Metasploit)
-
-
Custom Exploit Development
- If needed, develop tailored payloads
-
Web Exploits
- SQLi, XSS, RCE, SSRF
-
Network Exploits
- SMB relay, RDP vulns, unpatched services
-
Client-Side Attacks
- Phishing, malicious attachments
-
Privilege Escalation
- Kernel exploits, misconfigured services, token stealing
-
Payload Delivery
- Using reverse shells, web shells, or bind shells
π‘οΈ 4. Maintaining Access
Objective: Create persistence on the system to retain access.
Steps:
-
Backdoors/Reverse Shells
- Use Netcat, custom shells, scheduled tasks
-
Create Hidden User Accounts
-
Trojans and Malware
- Drop persistent malicious files
-
Credential Dumping
- Tools:
Mimikatz,LaZagne,secretsdump.py
- Tools:
-
SSH key installation / RDP access setup
-
Modify Registry/Startup Scripts (Windows)
-
Establish C2 (Command and Control) Communication
π§½ 5. Clearing Tracks
Objective: Erase evidence to avoid detection.
Steps:
-
Clear Shell History
-
Remove Logs
-
System logs, authentication logs
-
Tools:
logwiper, manual cleanup
-
-
Delete Dropped Files and Scripts
-
Cover Persistence Mechanisms
-
Wipe Tools and Payloads
-
Timestamp Alteration
- Touch command, timestomping
π 6. Reporting
Objective: Document findings and provide actionable recommendations.
Steps:
-
Executive Summary
- Business impact, high-level insights
-
Technical Details
- Each vulnerability found, PoC screenshots
-
Attack Path Mapping
- How initial access led to further compromise
-
Risk Rating
- CVSS score, likelihood, and impact
-
Remediation Guidance
- Patch links, secure configurations
-
Appendices
- Tool output, raw data, command logs
-
Debrief with Stakeholders
- Presentation of findings
Automation is the βKeyβ :
Automation in the Development is as important as automation in Security ,
Dev + Operation + Automation = DevOps
Automation in Security are,
- SubDomain finder β> Subfinder, AssetFinder, Amass

-
PortScanning β> Namp and Masscan

-
Screenshot for SubDomains β> Eyewitness and aquatone

-
Directory findings β> FFuf and gobuster

-
JavaScript Analysis β> Linkfinder, gf

-
Automation of Parameter discoveryβ> Arjun, Spider

-
Automaion XSS β> dalfox,XSStrike

-
Automate SQL Injection testingβ> Sqlmap

-
SSRF automation β> Gopherus, interactsh (Redis, Mysql and other Servers)

-
Automating LFI (Local File Inclusion) and RFI(Remote File Inclusion) detectionβ> lfisuite, fimap

-
Automate Open Redirect Detection β>(Phishing, Session Hijacking , unathorized access) Oralyzer

-
Automating Security Headers check β> Nikto, Httpx-Toolkit

-
Automating API recon β> Postman, KiteRunner

-
Automating Content Discovery β> gau, waybackUrls

-
Automating S3 bucket enumeration β> AWSBucketDump

-
Automating CMS(Content Management System) enumeration β>(wordpress, Joomla, Drupal) CMSeek

-
Automating WAF detection β> WAFOOF

-
Automating Information Disclosure Detection β> git-dumper

-
Automating Reverse Shell Generation β> MSFvenom(Metaspolit)

-
Automating Mass Exploitation with Metaspolit β>Metasploit

π 1. Reconnaissance & Discovery
These tools help you gather information about the target environment.
-
Nmap β For port scanning, service/version detection, and basic scripting (NSE scripts).
-
Amass β Great for subdomain enumeration.
-
Sublist3r β Fast passive subdomain enumeration.
-
theHarvester β Gathers emails, subdomains, IPs from public sources.
-
Shodan β Search engine for Internet-connected devices; can give insights into exposed services and vulnerabilities.
π 2. Web Application Scanning
To find common vulnerabilities and weak configurations.
-
Burp Suite Pro β Industry standard for web app testing. Excellent scanner, repeater, intruder, and extensions (BApp store).
-
OWASP ZAP β Free alternative to Burp; has automated scanning and scripting capabilities.
-
Nikto β Command-line web server scanner for outdated software and misconfigurations.
-
Arachni β Advanced web scanner (discontinued but still usable); covers injection, session issues, etc.
-
Wapiti β Lightweight command-line vulnerability scanner for web apps.
π§ͺ 3. Manual Testing & Exploitation
These tools help when youβre diving deep into vulnerabilities.
-
SQLMap β Automated SQL injection and database takeover tool.
-
XSStrike β XSS detection and payload generator (more intelligent than basic scanners).
-
Commix β For Command Injection vulnerabilities.
-
WFuzz / FFUF β For fuzzing URL parameters, hidden files, or directories.
-
Postman β Great for testing APIs, especially RESTful ones.
-
JWT.io Debugger β For analyzing JSON Web Tokens in auth systems.
-
HackTools (Burp/ZAP Extension) β Quick access to payloads and common exploits.
π 4. Authentication & Session Testing
Check how the app handles login, sessions, and role-based access.
-
Cookie Editor browser extension β Modify cookies manually.
-
Autorize (Burp Extension) β Detect IDOR and access control flaws.
-
AuthMatrix (Burp Extension) β Test complex authorization schemes.
π± 5. API Testing
For applications with mobile or SPA frontends that use APIs.
-
Postman β For manually crafting and testing API requests.
-
Burp Suite β Intercepts and modifies API calls made by frontend apps.
-
Insomnia β A clean, modern alternative to Postman.
π§° 6. Framework-Specific or CMS Tools
Useful if you know the app uses a particular tech stack.
-
WPScan β For WordPress security scanning.
-
JoomScan β For Joomla.
-
Droopescan β For Drupal.
-
CMSmap β Multiplatform CMS vulnerability scanner.
π§― 7. Reporting and Management
Document findings and manage test results.
-
Dradis β Collaboration and reporting platform for pentest teams.
-
Serpico β Lightweight reporting tool for security assessments.
-
Faraday β Centralized vulnerability management and collaboration.
π Example Workflow with Nessus:
-
Nessus + Nmap for network-level vulnerabilities and misconfigurations.
-
Burp Suite + ZAP for in-depth application logic testing.
-
SQLMap + XSStrike + Commix for targeted injection flaws.
-
WFuzz + Dirsearch for hidden endpoints and brute-forcing.
-
Postman + JWT tools for API and auth testing.
Disclaimer: Pentesting finding bug is like a βgold rushβ , we may ended up with nothing or with a βcritical bug huntβ