Red vs. Blue - Red Team Bottlenecking

- 5 mins


We had just under 2000 beacons

It’s been a while since I’ve posted about Red vs. Blue, but for a pretty good reason - I’m not actively developing RvB since I graduated. But I like to help out as a red teamer and also like to spend time developing new tooling to make life easier as a RTer in RvB. I’ve taken some sort of lead role and am the main guy to set up infra before competition and represent the red team to the rest of the organizers.

One of the issues that RvB deals with is lack of RTers, or should I say, experienced red teamers. We took a bit hit during Fall 2024 RvB, where most of the designated red teamers were out competing in CPTC that very same day. We only have 5-6 people attacking 4 boxes x 12ish teams, so we were massively understaffed. Some folks from the dev team and SWIFT eboard volunteered to be red teamers, and they were pretty green with the workflow for red teaming.

How did the event pan out? Not bad, but I had some good lessons learned.

Red Teaming - RvB vs HTB

Red teaming for RvB is really different than doing HackTheBox or TryHackMe - it’s more of a post-exploitation/automation/defense evasion challenge, rather than initial access/privesc exploration.

Yes, you kinda need to know the basics of red teaming, so doing some HTB or THM is required. For example:


HackTheBox Labs focues most on getting initial access and privesc, while RvB RT focuses most on persistence and defense evasion.

However we’re not really trying to uncover the tiniest of misconfigurations, like you’d do on HTB/THM. The RvB environment is ripe with misconfigurations and vulnerabilities that are designed for easy initial access. We’re expecting low-hanging fruit vulns. Even more, we also get the default admin creds at the same time as the blue teams, so we can prepare commands and scripts to use.

Michael, the guinea pig

I was catching up with my buddy Michael a couple of weeks prior to the event, and I invited him to be a red teamer for this event. Althought he leaned more into IT/sysadmin stuff for work, he accepted the invite, and I had an entire study plan to get him up to speed. We focused on Windows exploitation for him.

It was basically split into the following activities:

He got pretty comfortable with the techniques - to the level where he can do things on his own in an actual RvB setting without much assistance. (the goal with this study plan)

Other Preparation

We had other RTers that were also more comfortable with Windows, but no Linux people. So I decided to focus on Linux for this comp. Linux pentesting was more of my weak spot, and when it comes to persistence/defense evasion I knew some basic stuff but the commands can get pretty granular.

I ended up using Mythic as the C2 server for Linux environments, now that it came with a “run a command on all beacons” feature, and spent a good amount of time setting up infra and Kali instances for the red teamers.

Two of the eboard folks volunteered to help out with red teaming, albeit a bit too late. We didn’t really have time to go thru an entire study plan like I did with Michael, so I had to figure out what they knew already and how to utilize their existing knowledge as best as possible, such as having them focus in port scanning and interacting with Mythic to turn off services, while I worked on more complex tasks such a website defacement and persistence across all teams.

Competition

While I was able to get Linux beacons easily, I think I spent way too much time troubleshooting Windows stuff. Some of our automation stuff for Mythic didn’t work so I was like “oh well”. I mean the most we did was turn off services. It was difficult to do team-specific hax because, well, my focus was thinnly spread across all teams.

As the primary operator for Linux stuff, my attention was 100% focused on RvB red teaming. I wish I could have been more helpful with guiding the newer folks, but it was near impossible to do.

Part of being lead is helping the newer folks to be more comfortable with the red teaming process, since maybe they can develop a genuine interest and contribute more next comp, and honestly it feels really good to overpower the blue teamers in these settings. Also it’s just a really good skill to have, and immensely helps with overall security knowledge.

Lessons Learned

As a lead, you can either:

Not both.

If you want to red team…

then decide early on, because there are people that are willing to help! It just takes a lot of time to get you up to speed and comfortable with the techniques, and it is not as difficult as you think!

Taylor Nguyen

Taylor Nguyen

Cybersecurity and other stuff