Notes For Try Hack Me Red 2

Just some notes for myself

Rules of Engagement

It is a legally binding outline of the client’s objective and scope. NDAs can also be used.

SectionDetail
Executive SummarySummary of the contents and authorization within
PurposeWhy the RoE is used
ReferenceReferences used
ScopeAgreed upon restrictions and guidelines
DefinitionsTechnical terms used
Rules of Engagement and Support AgreementDefines the obligations and technical expectation
ProvisionsDefine exceptions and additional info.
Requirements, Restrictions, and AuthorityDefine expectations of the red team.
Ground RulesLimitation of red team
Resolution of issues/Points of ContactContain all essential personnel
AuthorizationStatement of authorization for the engagement
ApprovalSignatures from both parties
AppendixAdditional info.

Engagement Planning

Engagement Plan :

A overarching description of the technical requirements of the red team. Content can include: CONOPS, Resource Plan( timelines and information as a list: personnel, hardware, cloud requirements)

Operations Plan:

Specifics of the engagement, expanding the engagement plan. Contents can include: Operators, known info, responsibilities, Stopping Conditions, Technical Requirements

Missions Plan:

Exact commands to run and execution time of the engagement. Contents (required): Objectives, Operators, Exploits/Attacks, Targets (users/machines/objectives), Execution plan variations

Remediation Plan:

Describe what happens after the campaign. Contents: report, remediation consultation

CONOPS (Concept of Operation)

The CONOPS document is non-technical summary, assuming reader has zero technical background. However, should include details like common tooling, target group, etc. These include:

  • Client name
  • server provider
  • timeframe
  • General Objectives/Phases
  • Other Training Objectives (Exfiltration)
  • High-Level Tools/Techniques planned to be used
  • Threat group to emulate (if any)
Yi Yang
Yi Yang

My research interests include end-to-end encrypted systems, encryption, and information security.