Red Team Notes

This page collects the parts of my site that are most relevant to red team work: OPSEC, lateral movement, credential attacks, Active Directory abuse, persistence, tunneling, and operator workflow.

I am not using this page as a vague introduction to red teaming.
I am using it to connect the posts that best reflect how offensive operations scale from a single foothold into a broader attack path.

Core Red Team Topics on This Site

The strongest red-team-oriented coverage on this site falls into five areas:

  1. OPSEC and detection-aware workflow.
  2. Active Directory enumeration and access control abuse.
  3. Credential attacks and ticket abuse.
  4. Lateral movement and persistence.
  5. Infrastructure, pivoting, and simulated operation flow.

OPSEC and Detection-Aware Thinking

For direct OPSEC-focused material, start with:

That note is useful because it keeps the focus on operational behavior, not just tools.

Active Directory, Credential Abuse, and Lateral Movement

The OSCP series contains the densest material for AD and operator tradecraft:

For a concise operator reference, use the OSCP PEN-200 Cheat Sheet.

AD-Oriented Lab Writeups

These writeups are the best fit if you want concrete red-team-like attack chains:

They are useful because they move beyond isolated exploitation and into domain context, privilege relationships, and chaining opportunities.

Pivoting, Tunneling, and Infrastructure Movement

Operator workflow depends on reliable movement across segmented environments.
These pages are the most relevant:

Red Teaming and Web Entry

Many operations still begin with web attack surface.
For the application-security side that can feed an operator workflow, continue with Web Security Notes: Web Recon, XSS, SSTI, SSRF, IDOR, and Exploitation Cases.

If your goal is to use this site specifically for red-team-oriented study, read in this order:

  1. CYBERSEC 2025 OPSEC note
  2. OSCP PEN-200 Part 6
  3. OSCP PEN-200 Part 7
  4. HackTheBox: EscapeTwo [Active Directory]
  5. HackTheBox: Puppy [Active Directory]

Why This Red Team Hub Exists

This site already had the raw material for red-team-oriented content, but it was spread across lab notes, exam notes, conference notes, and individual machine writeups.
This page exists to connect them as one operator-focused path.

For the broader offensive-security route, continue with Penetration Testing Notes: Recon, Web, Privilege Escalation, AD, and Pivoting.