top of page

RED TEAMING : My First Experience

Writer's picture: SumeetSumeet

Updated: Oct 9, 2019

In May, 2019, I worked in the back-end of a red team operation at a major pharma corporation in India.


For this post, I'll use the name Example Ethicals as the company name.

For a perfect Red Team Attack, we had to use a lot of strategies. There was little chance of a successful attack, so we had to attack on all fronts.


Step 1

We began enumerating the company's subdomains, and couldn't find anything at first. However, after about half an hour, we found a subdomain mailbackup.exampleethicals.com

This subdomain had an outlook webpage for email login, so we had an opportunity.


I was thinking about the best method to find login details, and that's when I thought of this idea: the site was mailbackup.exampleethicals.com and here's what I made: mailbackup.examplethicals.com . Can you spot the difference? Look at the two e's in between.

Next, I made an Outlook Clone which looked like this


See. there's hardly any difference except for the scroll bars.


Our next step was to find the email addresses


We used Harvester for email id enumeration(it worked at that time) so we got a list of about 50 email ids of company employees


Next, another team member crafted an official looking email which we sent to the employees using an email id that looked like it was from the senior executives using email spoofing(more on that in future blogs)



So step 1 was over.


Step 2

Our front end Red Team would go to the company offices in Mumbai. They had gathered a lot of data regarding the location, employee timings etc.


I used Maltego to create an entire information map


A Maltego Graph mapping company details

Our team had to physically access the company offices as art of the Red Team project. We had a lot of maps and office photos, and had also made fake id cards just in case.


But what would we even do there? We wanted Wifi passwords and other data. This was our primary objective. Luckily, one of the guys on the team had a USB Rubber Ducky.


I made a script where all they had to do was to plug in the ducky in any Office PC, and all Wifi Passwords would be extracted from it. I can't find my script now, but here's a somewhat similar ducky script. You can find my USB Rubber Ducky tutorial here


Step 2 was over


Step 3

Now, if you're into cyber sec or have watched Mr. Robot, you might know about the raspberry pi ssh tool. Well, we decided to make just this.

Once plugged into the network, it can perform scans, exploit routers, pc's etc. It could do anything a normal PC on the network could do.


Quite simply, what I did was installed Kali Linux on the pi. The problem was how would I access it from another network in a reliable manner. Port forwarding was an option, but my entire company had only one router with a bad net connection, so that wasn't an option. What i did was ssh'ed into the pi using dataplicity. This was quite simple on a local network, but for another another network with most details unknown, it seemed almost impossible. However, after a lot of pondering, thinking, and tinkering, I decided to make a cron job. What dataplicity requires to connect is a script to run once you connect to the network, so I created a cron job(an script that runs in the background according to the cron job time set)

What the script did was connected to dataplicity every time the pi was started, using the current network information. Hence, we could connect to the pi even after it was connected on another network.


Step 4

Now, we were also preparing WiFi hacking tools. We began generating custom word-lists that were the closest to what the company router password would be. We generated about a million words in total to crack the password using brute-force.


Step 5

Our team went to the site location and captured a handshake

We cracked the password and using all the tools and methods, the method was fairly successful (can't elaborate much because I wasn't at the location)


Here's what a red teaming operation actually looks like




Here's how you can keep your network safe https://www.thehackerforum.com/post/network


Here's how you can stay secure online https://www.thehackerforum.com/post/anonymity


Here's the USB Rubber Duck tutorial https://www.thehackerforum.com/post/usbducky


Here's the compete guide to start hacking https://www.thehackerforum.com/post/hacking


4 comments

Recent Posts

See All

4 Comments


Sumeet
Sumeet
Mar 29, 2020

Nice

Like

randy109
randy109
Dec 16, 2019

This is too good. I was looking for a post like this and finally got it!!

Like

hackerland
Nov 13, 2019

GR8

Like

Dhanesh Dodia
Dhanesh Dodia
Oct 01, 2019

Wow you explained so well. Nice work keep it up 👍

Like
  • White Instagram Icon
2020 @TheHackerForum
SUMEET MOTWANI

JOIN OVER 100,000 HACKERS FROM 110 COUNTRIES

SUBSCRIBE TO OUR MAILING LIST

bottom of page