المهارات red-team-tactics
🛡️

red-team-tactics

آمن

Learn Red Team Tactics with MITRE ATT&CK Framework

Security teams need to understand adversary behavior to build effective defenses. This skill provides structured guidance on red team operations based on the industry-standard MITRE ATT&CK framework.

يدعم: Claude Codex Code(CC)
🥉 74 برونزي
1

تنزيل ZIP المهارة

2

رفع في Claude

اذهب إلى Settings → Capabilities → Skills → Upload skill

3

فعّل وابدأ الاستخدام

اختبرها

استخدام "red-team-tactics". What are common privilege escalation techniques on Linux systems?

النتيجة المتوقعة:

Common Linux privilege escalation vectors include: SUID binary exploitation (execute files with owner permissions), sudo misconfigurations (NOPASSWD entries, wildcards in allowed commands), kernel vulnerabilities (Dirty Cow, PwnKit), and writable cron jobs (scheduled tasks executed as root). Always verify scope authorization before testing.

استخدام "red-team-tactics". How should I document detection gaps in my red team report?

النتيجة المتوقعة:

For each successful technique, document: (1) The MITRE ATT&CK technique ID and name, (2) Expected detection mechanisms that should have alerted, (3) Root cause analysis for why detection failed, (4) Specific recommendations to improve detection coverage, (5) Priority level based on technique prevalence and impact.

التدقيق الأمني

آمن
v1 • 2/24/2026

Static analysis flagged documentation text as malicious patterns, but all findings are false positives. The skill contains educational content about the MITRE ATT&CK framework with no executable code. C2 keywords and reconnaissance references appear only in tables and diagrams explaining adversary tactics for defensive security training purposes.

1
الملفات التي تم فحصها
205
الأسطر التي تم تحليلها
0
النتائج
1
إجمالي عمليات التدقيق
لا توجد مشكلات أمنية
تم تدقيقه بواسطة: claude

درجة الجودة

38
الهندسة المعمارية
100
قابلية الصيانة
87
المحتوى
50
المجتمع
100
الأمان
91
الامتثال للمواصفات

ماذا يمكنك بناءه

Security Assessment Planning

Plan authorized red team engagements using structured adversary tactics and techniques from MITRE ATT&CK.

Blue Team Training

Train defensive security teams on adversary behaviors to improve detection and response capabilities.

Security Control Validation

Map existing security controls against adversary techniques to identify coverage gaps.

جرّب هذه الموجهات

Basic Attack Phase Explanation
Explain the reconnaissance phase of a red team engagement. What are the key objectives and what information should be gathered?
Technique Selection Guidance
I need to test detection for credential dumping on Windows. What MITRE ATT&CK techniques should I consider and what are the trade-offs?
Defense Evasion Planning
Help me plan defense evasion techniques for an authorized assessment. What methods can test detection capabilities while minimizing operational impact?
Report Generation
Generate a red team report section documenting the lateral movement techniques used, including MITRE ATT&CK IDs, detection gaps identified, and remediation recommendations.

أفضل الممارسات

  • Always obtain written authorization and clearly defined scope before any testing
  • Follow the rules of engagement and minimize impact on production systems
  • Document all actions taken during the engagement for accurate reporting

تجنب

  • Rushing to exploitation without proper reconnaissance and planning
  • Causing unnecessary damage or disruption beyond proof-of-concept
  • Failing to document techniques and skipping detailed reporting

الأسئلة المتكررة

Is this skill suitable for learning ethical hacking?
Yes, this skill provides educational content about adversary tactics for authorized security testing. Always practice only on systems you own or have explicit written permission to test.
What is the MITRE ATT&CK framework?
MITRE ATT&CK is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. It provides a standardized taxonomy for describing adversary behavior during engagements.
Can I use this for unauthorized penetration testing?
No. This skill is intended for authorized security assessments only. Unauthorized access to computer systems is illegal. Always obtain proper authorization before conducting any security testing.
How does red teaming differ from penetration testing?
Penetration testing focuses on finding vulnerabilities in specific systems. Red teaming simulates full adversary campaigns to test detection and response capabilities across the entire organization.
What tools do I need to perform red team operations?
This skill provides tactical guidance and methodology. Actual tooling depends on your engagement scope and may include commercial platforms, open-source tools, or custom scripts. Always ensure tools are used within legal authorization.
How do I get started with red teaming as a career?
Build foundational knowledge in networking, operating systems, and security concepts. Pursue relevant certifications (OSCP, CRTO). Practice in legal lab environments. Start with defensive roles to understand detection mechanisms before transitioning to offensive security.

تفاصيل المطور

المؤلف

sickn33

الترخيص

MIT

مرجع

main

بنية الملفات

📄 SKILL.md