We may earn an affiliate commission when you visit our partners.
Dale Meredith, Lee Allen, Dawid Czagan, Ricardo Reimao, Aaron Rosenmund, Josh Stroschein, Guillaume Ross, Matt Glass, Rishalin Pillay, and Tim Tomes

MITRE ATT&CK® is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK knowledge base is used as a foundation for the development of specific threat models and methodologies in the private sector, in government, and in the cybersecurity product and service community. Further details on the MITRE ATT&CK® framework can be found at https://attack.mitre.org/

Read more

MITRE ATT&CK® is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK knowledge base is used as a foundation for the development of specific threat models and methodologies in the private sector, in government, and in the cybersecurity product and service community. Further details on the MITRE ATT&CK® framework can be found at https://attack.mitre.org/

Our red team operations tooling courses map to the MITRE ATT&CK® matrix tactics, techniques, and procedures. Each course focuses on the use of a specific industry-standard, generally open source, tool to carry out adversary emulation. Knowing what a tool is and how it can perform a specific task, will ultimately lend to your ability as an organization or an individual to detect and defend against specific attack vectors.

The ATT&CK section outlines tools used to achieve the following outcomes:

This collection is no longer available.

Share

Help others find Paths from Pluralsight by sharing it with your friends and followers:

What's inside

14 courses

Technical Information Gathering with theHarvester

The first and most important part of a red team engagement is reconnaissance. In this course, you will learn to gather technical information such as DNS subdomains and IP addresses, as well as people information, using theHarvester.

Privilege Escalation and Client Execution with MSFVenom

Learn to generate a variety of shell code payloads to fit your exploit, target, and situation. This course will teach you how to use MSFVenom to generate payloads within a standalone executable. You'll discover options to change payload capabilities and explore generating payloads for existing exploits. By the end, you'll have the skills to exploit vulnerabilities using MSFVenom. You will also learn about privilege escalation and client execution.

Initial Access with Luckystrike

Malicious office documents are an effective way to gain an initial foothold into a network. This course teaches how to use Luckystrike to create custom malicious documents, manage payloads, and utilize templates. You will learn to build a payload catalog, import templates, and integrate custom payloads from other red team tools. Upon completion, you will have the skills to manage all your malicious document needs.

Credential Access with Hashcat

Hashcat is the leading offline password cracker used by red team members and penetration testers. This course teaches you how to use Hashcat to crack passwords with different password cracking techniques, including dictionary attacks, dictionary attacks with rules, dictionary attacks with masks (hybrid attacks), and cracking password-protected PDF and DOCX files.

Credential Access with John the Ripper

John the Ripper (JtR) is widely used within red team assessments. Learn how to leverage the powerful capabilities of JtR to crack passwords of various hash types. Performing password cracking is a common task performed in a red team engagement. In this course, you will gain the ability to crack commonly used password hashes leveraging the highly customizable tool, John the Ripper.

Credential Access with THC Hydra

THC Hydra is a powerful network login cracker that supports various protocols. It helps identify weak passwords for Red or Blue Teaming efforts.

Discovery with BloodHound

Attacking Active Directory grants control, access to data, and objective achievement. BloodHound visualizes the shortest path to compromise systems.

Discovery with ADRecon

In this course, we cover the ADRecon tool, which enables you to extract valuable information from the Active Directory, including users, groups, computers, policies, and Kerberos tickets.

Lateral Movement with Mimikatz 2

Among other features, Mimikatz provides lateral movement capabilities such as pass the hash, user impersonation, and the creation of golden and silver tickets.

Lateral Movement with PsExec

Learn to use PsExec to execute commands, programs, and laterally move to remote Windows hosts without installing additional software.

Lateral Movement with WMIOps

WMIOps enables penetration testers to execute commands, gather information, and run PowerShell scripts on remote Windows machines. This course covers lateral movement using WMIOps, including executing commands on remote hosts, gathering information from Windows servers, and simulating lateral movement by opening remote PowerShell sessions on Windows devices.

Collection with PowerSploit

After gaining access to machines on a network, your next task is collecting sensitive information. In this course, you will explore PowerSploit, a tool for red team professionals.

Command and Control with Covenant

Covenant C2 command and control uses just-in-time, in-memory, .NET compilation, and dynamic profiles to fool defensive detections. Skill up your red team techniques by leveraging the next generation of adversary command and control capabilities.

Command and Control with Pupy

Learn to use Pupy to manage target workstations after exploitation. Discover how to generate client files, use encryption protocols, and capture information from targets.

Learning objectives

  • What the tool is and does
  • Where to get it
  • How to emulate adversary techniques

Save this collection

Save Red Team Tools to your list so you can find it easily later:
Save
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2025 OpenCourser