Red Team Attack Console

Offensive Security Operations & Attack Simulation

Attack Toolkit
Reconnaissance
Network Scanning & Enumeration
Exploitation
Vulnerability Exploitation
Privilege Escalation
Elevate Access Permissions
Lateral Movement
Move Across
Network
Data Exfiltration
Extract Sensitive
Data
Persistence
Maintain User
Access
Target Selection
WEB-SERVER-01
192.168.1.10 | Apache 2.4.41
Online
DB-SERVER-01
192.168.1.20 | MySQL 8.0
Online
DOMAIN-CONTROLLER
192.168.1.5 | Windows Server 2019
Online
FILE-SERVER-01
192.168.1.30 | SMB Share
Online
MITRE ATT&CK Techniques
T1190 - Exploit Public-Facing App
T1078 - Valid Accounts
T1059 - Command Execution
T1003 - Credential Dumping
T1021 - Remote Services
T1048 - Exfiltration
Attack Timeline
14:23:15
Reconnaissance started
Scanning WEB-SERVER-01 for open ports
14:24:32
Vulnerability detected
CVE-2021-44228 (Log4Shell) found on port 8080
14:25:47
Exploit executed
Reverse shell established
Command & Control
[RED-TEAM]$ Awaiting commands...
root@attacker: