Redteam-Hardware-Toolkit - Red Team Hardware Toolkit
A collection of hardware s that aid in red team operations. This repository will help you during red team engagement. If you want to contribute to this list send me a pull request.
A Red Team should be formed with the intention of identifying and assessing vulnerabilities, testing assumptions, viewing alternate options for attack and revealing the limitations and security risks for that organization.
There are many benefits to Red Teaming. First, you have a designated group with tactical experience in challenging the security of your organization at all times. This is important to see how your organization will fair against the very same tactics adversaries will hope to deploy on your environment. An effective Red Team:
- Challenges your organization’s assumptions and identifies faulty logic or flawed analysis.
- Assesses the strength of the evidence base or the quality of your information Identifies alternative options or outcomes and/or explores the consequences of an action or attack plan.
- Tests your system, network, applications and more through the eyes of an adversary.
- Understands the options for an adversary to break into and move throughout your system.
Role of a Red Team
This is a designated group that tests the security posture of your organization to see how it will fair against real-time attacks – before it actually happens. Hiring people with different backgrounds and specialties helps to round out your security red team to ensure you are testing and seeing your company form the various perspectives of an attacker.
Your Red Team should periodically challenge your security measures throughout the year. Primarily their job will be testing your infrastructure to see how it’d hold up against different attack methodologies without giving notice to fellow employees. But also, it’s worthwhile to have your Red Team test your organization after implementing a new security software or program to the mix.
Red Team vs. Penetration Tester
Penetration Testers are a must have for any organization. This is a designated person who will ethically hack and evaluate your environment. In this role they will be the point of contact and operate as the brains behind your security scope.
While it’s good to have someone in place to handle this – keeping up with the number of tests needed is growing to be too much for one individual to handle. The number of attacks are growing and the amount of research and experience that’s required to get ahead of these attacks is increasing the gap between time of attack and time of discovery. That’s where red teaming comes in. Hiring a group of individuals to test and monitor with full visibility into your security posture routinely and consistently better ensures you have the appropriate measures in place to secure your organization.
Hardware Toolkit List :
- Lock picks (pocket) - commonly used picks
- Under-the-door tool
- Canned air, hand warmers (request-to-exit bypass, etc.)
- Shove knife/shrum tool
- -Crash bar tool
- Dimple lock gun
- Tubular lock picks
- Fire/emergency elevator key set
- USB keylogger and Hak5 rubber ducky
- Hak5 LAN turtle
- Pineapple nano
- LAN tap
- Wafer and warded pick set
- Laptop or mobile device
- External hard drive
- Fake letter of authorization (as a plan B and to test incident response)
- Real letter of authorization
- Props for guises if utilizing social engineering
- RFID thief/cloner (something that is easy to hide - I often use a clipboard like the one shown in the picture above)
- Camera (or just use your smartphone)
- Lock picks (pocket) - common
- Lock picks (backpack) - expanded set
- Under-the-door tool
- Shove knife/shrum tool
- Crash bar tool
- Snap gun with interchangeable needles
- Dimple lock gun
- Tubular lock picks
- Hand warmers/canned air
- Leather gloves/good shoes
- Fire/emergency elevator key set
- USB keylogger and Hak5 rubber ducky
- Hak5 LAN turtle
- LAN tap
- Wafers and warded pick set
- Laptop if needed
- External hard drive
- Malicious drops x4 (USB, etc.)
- Rogue access point (PwnPlug, Pi, whatever your flavor of choice)
- Hak5 pineapple
- 15dbi wireless antenna (for outside, not really something you want to stuff in your bag inside).
- Nexus 7 with nethunter, TP-link adapter etc.
- Props for guises if utilizing social engineering
- Fake letter of authorization (as a plan B and to test incident response)
- Real letter of authorization
- RFID thief/cloner
- Camera (or just use your smartphone)
- Snake camera (a bonus for looking over drop ceilings or floors)
- Multi-tool
A few example resource links for some of the above tools
- www.sparrowslockpicks.com
- http://shop.riftrecon.com
- www.wallofsheep.com
- www.hackerwarehouse.com
- www.hak5.org
Miscellanies Considerations
- Various USB cables (A, B, mini, micro, OTG, etc.)
- SD Cards, microSD cards
- Smartphone (earpiece if with a team)
- Body camera (GoPro/ACE Cameras are sometimes handy with client approval)
- Extra power packs/batteries
- Small flashlight (low lumen)
- RTFM: Red Team Field Manual
Book :
- Rtfm: Red Team Field Manual
- The Hacker Playbook: Practical Guide To Penetration Testing
- The Hacker Playbook 3: Practical Guide To Penetration Testing
- Cybersecurity Attacks (Red Team Activity) [Video]
- Cybersecurity – Attack and Defense Strategies
- Red Team: How to Succeed By Thinking Like the Enemy
Contact :
- Linkedin : https://www.linkedin.com/in/ismailtasdelen/
- Twitter : https://twitter.com/ismailtsdln
- GitHub : https://github.com/ismailtasdelen
- YouTube : https://www.youtube.com/c/IsmailTasdelen
Via: feedproxy.google.com