# Red Team

## About

Red Teaming is the act of performing Adverserial Tactics, Techniques, and Procedures ([TTPs](https://csrc.nist.gov/glossary/term/tactics_techniques_and_procedures)) to represent an attacker, such as a state sponsored threat actor, or an insider threat. It is a term created by the US Military to test battalion readiness (See [Geronimo ](https://en.wikipedia.org/wiki/509th_Infantry_Regiment_\(United_States\))Battalion) or as an OPFOR for allied countries.&#x20;

## The Need

The point of Red Teams is to measure cyber readiness and the physical security of a company, whether internal, or external. The difference betwen a Red Team and a Penetration Test is that red teams aren't disclosed to the blue team or organisation except for an insider contact (the CISO or similar). Watch the video for a small introduction to Red Teaming.

{% embed url="<https://www.youtube.com/watch?pp=ygUVcmVkIHRlYW1pbmcgZXhwbGFpbmVk&v=oW0eH3yS1Yc>" %}

## Resources

### Blogs

{% embed url="<https://ired.team>" %}

### Books

{% embed url="<https://www.packtpub.com/product/hands-on-red-team-tactics/9781788995238>" %}

{% embed url="<https://redteam.guide/>" %}

{% embed url="<https://www.packtpub.com/product/cybersecurity-attack-and-defense-strategies/9781788475297>" %}

{% embed url="<https://redteamguides.com/p2_landing_page.html>" %}

### Organisations

{% embed url="<https://redteamvillage.square.site/>" %}

{% embed url="<https://taggartinstitute.org/>" %}

### Courses

{% embed url="<https://tryhackme.com/path/outline/redteaming>" %}
Red Team Path
{% endembed %}

{% embed url="<https://taggartinstitute.org/p/responsible-red-teaming>" %}
Responsible Red Teaming - Husky Hacks
{% endembed %}

{% embed url="<https://www.youtube.com/playlist?list=PLBf0hzazHTGMjSlPmJ73Cydh9vCqxukCu>" %}
Red Team Fundamentals Course
{% endembed %}

{% embed url="<https://youtu.be/OtcP8c4wZys>" %}


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://blog.securescape.cc/offensive-security/red-team.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
