Red Team Attack Patterns
Understand how professional Red Teams operate. Detection indicators and response playbooks mapped to MITRE ATT&CK framework.
Based on MITRE ATT&CK Framework
All techniques are mapped to MITRE ATT&CK IDs. Focus on patterns most relevant to CCDC competition scenarios.
Full MITRE ATT&CK MatrixRapid Detection Guide
Fast lookup for common attacks during competition.
| Attack | Windows Indicator | Linux Indicator | Immediate Action |
|---|---|---|---|
| Brute Force Login | 4625 (many) | "Failed password" in auth.log | Block source IP, check if succeeded |
| New Admin Account | 4720 + 4732 | /etc/passwd + /etc/group changes | Disable account, investigate source |
| Scheduled Task/Cron | 4698 | crontab changes, /etc/cron.d/ | Remove task, check for payload |
| Service Installed | 7045 | systemd unit created | Stop service, remove, investigate |
| Lateral Movement (SMB) | 5140/5145 to C$ or ADMIN$ | N/A | Block source, check destination |
| Lateral Movement (SSH) | N/A | SSH from internal IP | Kill session, change keys |
| Process Injection | Sysmon 8/10 | ptrace calls in audit | Kill process, investigate parent |
| Data Exfiltration | Large outbound transfers | Unusual network traffic | Block destination, assess damage |
Initial Access
How attackers get their first foothold
Valid Accounts
Using legitimate credentials (often default or weak passwords)
Detection Indicators
- Multiple failed logins followed by success
- Login from unusual source IP
- Login outside normal hours
- Login to multiple systems rapidly
Event ID 4624 (success), 4625 (failure)/var/log/auth.log, /var/log/secureResponse Actions
- Change ALL default passwords immediately
- Disable guest and unused accounts
- Enable account lockout policies
- Monitor authentication logs continuously
Exploit Public-Facing Application
Exploiting vulnerabilities in web apps, databases, or services
Detection Indicators
- Unusual HTTP requests (SQLi, XSS patterns)
- Web application errors in logs
- Unexpected process spawned by web server
- Database queries from web context
IIS logs, Application Event Log/var/log/apache2/*, /var/log/nginx/*Response Actions
- Patch known vulnerabilities
- Enable WAF if available
- Review and harden web app configs
- Restrict database user permissions
Persistence
How attackers maintain access after reboot
Scheduled Task/Job
Creating scheduled tasks or cron jobs for persistence
Detection Indicators
- New scheduled tasks created
- Tasks running from unusual paths
- Tasks running as SYSTEM or root
- Cron jobs in unexpected locations
Event ID 4698 (task created), Task Scheduler log/var/log/cron, crontab -l for all usersResponse Actions
- Audit all scheduled tasks immediately
- Remove unauthorized tasks
- Monitor task creation events
- Restrict task creation permissions
Create Account
Creating new accounts for persistent access
Detection Indicators
- New user account created
- Account added to admin groups
- Account created with unusual naming
- Service accounts with interactive login
Event ID 4720 (user created), 4732 (added to group)/var/log/auth.log, /etc/passwd changesResponse Actions
- Document all legitimate accounts
- Immediately disable unknown accounts
- Alert on any account creation
- Review group memberships hourly
Boot/Logon Autostart
Adding malware to startup locations
Detection Indicators
- New entries in Run/RunOnce keys
- Startup folder modifications
- New services set to auto-start
- systemd unit files created
Sysmon Event ID 13, Registry auditing/etc/systemd/system/, /etc/init.d/Response Actions
- Baseline all startup entries
- Remove unauthorized entries
- Monitor registry changes
- Audit systemd units
Privilege Escalation
How attackers gain higher privileges
Exploitation for Privilege Escalation
Exploiting software vulnerabilities to gain elevated privileges
Detection Indicators
- Unexpected SYSTEM/root processes
- Crashes in privileged services
- Unusual child processes from services
Sysmon Event ID 1, Application crashes/var/log/kern.log, audit.logResponse Actions
- Patch systems where possible
- Minimize running services
- Use application whitelisting
- Monitor process creation
Process Injection
Injecting code into legitimate processes
Detection Indicators
- Process accessing memory of other processes
- Legitimate process with unusual network activity
- DLL loaded from unusual path
Sysmon Event ID 8, 10/proc/[pid]/maps, audit.logResponse Actions
- Enable Sysmon for detailed logging
- Monitor for unusual process behavior
- Use EDR if available
Lateral Movement
How attackers move through the network
SMB/Windows Admin Shares
Using admin shares (C$, ADMIN$) for lateral movement
Detection Indicators
- Access to admin shares from workstations
- PsExec or similar tool execution
- Service creation on remote systems
- Large file copies to admin shares
Event ID 5140 (share access), 5145 (detailed)N/A - Windows specificResponse Actions
- Disable admin shares if not needed
- Restrict admin share access
- Monitor SMB traffic
- Use network segmentation
SSH
Using SSH for lateral movement on Linux systems
Detection Indicators
- SSH connections between internal systems
- SSH from unusual source
- SSH key added to authorized_keys
- Failed SSH attempts
N/A - Linux specific/var/log/auth.log, /var/log/secureResponse Actions
- Change SSH keys and passwords
- Restrict SSH to needed systems
- Monitor SSH logs continuously
- Consider SSH jump hosts
WMI
Using Windows Management Instrumentation remotely
Detection Indicators
- WMI process creation events
- Network connections to WMI ports
- Unusual WMI subscriptions
Event ID 5857-5861, WMI-Activity logN/A - Windows specificResponse Actions
- Restrict WMI access
- Monitor WMI activity
- Disable WMI if not needed
Impact
How attackers affect business operations
Service Stop
Stopping critical services to impact scoring
Detection Indicators
- Critical service stopped unexpectedly
- Multiple services stopped in sequence
- Service stop from unusual account
Event ID 7036 (service state change)journalctl -u [service], systemd logsResponse Actions
- Monitor scored services continuously
- Set up automatic service restart
- Alert on service state changes
- Have recovery procedures ready
Data Destruction
Deleting or corrupting critical data
Detection Indicators
- Mass file deletions
- Database drops or truncations
- Config file modifications
Object access auditing, Sysmon Event ID 23auditd file monitoringResponse Actions
- Backup critical configs IMMEDIATELY
- Monitor file integrity
- Restrict delete permissions
- Have restore procedures ready
Defacement
Modifying web content for visibility
Detection Indicators
- Web file modifications
- Unusual web server writes
- Content changes in monitored files
IIS logs, File auditinginotify, auditdResponse Actions
- Backup web content
- Monitor web directories
- Restore from backup quickly
- File integrity monitoring
Typical Red Team Attack Timeline
What to expect at each phase of competition.
Reconnaissance
Port scanning, service enumeration, credential testing
Initial Access
Default credential attempts, known exploit attempts
Foothold & Persistence
Backdoor installation, scheduled tasks, new accounts
Lateral Movement
Moving to other systems, privilege escalation
Full Compromise
Domain admin access, service disruption attempts
Persistence & Impact
Maintaining access, data theft/destruction, defacement