executing-red-team-engagement-planning
Red team engagement planning is the foundational phase that defines scope, objectives, rules of engagement (ROE), threat model selection, and operational timelines before any offensive testing begins.
Best use case
executing-red-team-engagement-planning is best used when you need a repeatable AI agent workflow instead of a one-off prompt.
Red team engagement planning is the foundational phase that defines scope, objectives, rules of engagement (ROE), threat model selection, and operational timelines before any offensive testing begins.
Teams using executing-red-team-engagement-planning should expect a more consistent output, faster repeated execution, less prompt rewriting.
When to use this skill
- You want a reusable workflow that can be run more than once with consistent structure.
When not to use this skill
- You only need a quick one-off answer and do not need a reusable workflow.
- You cannot install or maintain the underlying files, dependencies, or repository context.
Installation
Claude Code / Cursor / Codex
Manual Installation
- Download SKILL.md from GitHub
- Place it in
.claude/skills/executing-red-team-engagement-planning/SKILL.mdinside your project - Restart your AI agent — it will auto-discover the skill
How executing-red-team-engagement-planning Compares
| Feature / Agent | executing-red-team-engagement-planning | Standard Approach |
|---|---|---|
| Platform Support | Not specified | Limited / Varies |
| Context Awareness | High | Baseline |
| Installation Complexity | Unknown | N/A |
Frequently Asked Questions
What does this skill do?
Red team engagement planning is the foundational phase that defines scope, objectives, rules of engagement (ROE), threat model selection, and operational timelines before any offensive testing begins.
Where can I find the source code?
You can find the source code on GitHub using the link provided at the top of the page.
Related Guides
Best AI Skills for ChatGPT
Find the best AI skills to adapt into ChatGPT workflows for research, writing, summarization, planning, and repeatable assistant tasks.
Top AI Agents for Productivity
See the top AI agent skills for productivity, workflow automation, operational systems, documentation, and everyday task execution.
AI Agents for Coding
Browse AI agent skills for coding, debugging, testing, refactoring, code review, and developer workflows across Claude, Cursor, and Codex.
SKILL.md Source
# Executing Red Team Engagement Planning ## Overview Red team engagement planning is the foundational phase that defines scope, objectives, rules of engagement (ROE), threat model selection, and operational timelines before any offensive testing begins. A well-structured engagement plan ensures the red team simulates realistic adversary behavior while maintaining safety guardrails that prevent unintended business disruption. ## When to Use - When conducting security assessments that involve executing red team engagement planning - When following incident response procedures for related security events - When performing scheduled security testing or auditing activities - When validating security controls through hands-on testing ## Prerequisites - Familiarity with red teaming concepts and tools - Access to a test or lab environment for safe execution - Python 3.8+ with required dependencies installed - Appropriate authorization for any testing activities ## Objectives - Define clear engagement scope including in-scope and out-of-scope assets, networks, and personnel - Establish Rules of Engagement (ROE) with emergency stop procedures, communication channels, and legal boundaries - Select appropriate threat profiles from the MITRE ATT&CK framework aligned to the organization's threat landscape - Create a detailed attack plan mapping adversary TTPs to engagement objectives - Develop deconfliction procedures with the organization's SOC/blue team - Produce a comprehensive engagement brief for stakeholder approval > **Legal Notice:** This skill is for authorized security testing and educational purposes only. Unauthorized use against systems you do not own or have written permission to test is illegal and may violate computer fraud laws. ## Core Concepts ### Engagement Types | Type | Description | Scope | |------|-------------|-------| | Full Scope | Complete adversary simulation with physical, social, and cyber vectors | Entire organization | | Assumed Breach | Starts from initial foothold, focuses on post-exploitation | Internal network | | Objective-Based | Target specific crown jewels (e.g., domain admin, PII exfiltration) | Defined targets | | Purple Team | Collaborative with blue team for detection improvement | Specific controls | ### Rules of Engagement Components 1. **Scope Definition**: IP ranges, domains, physical locations, personnel 2. **Restrictions**: Systems/networks that must not be touched (e.g., production databases, medical devices) 3. **Communication Plan**: Primary and secondary contact channels, escalation procedures 4. **Emergency Procedures**: Code word for immediate cessation, incident response coordination 5. **Legal Authorization**: Signed authorization letters, get-out-of-jail letters for physical tests 6. **Data Handling**: How sensitive data discovered during testing will be handled and destroyed 7. **Timeline**: Start/end dates, blackout windows, reporting deadlines ### Threat Profile Selection Map organizational threats using MITRE ATT&CK Navigator to select relevant adversary profiles: - **APT29 (Cozy Bear)**: Government/defense sector targeting via spearphishing, supply chain - **APT28 (Fancy Bear)**: Government organizations, credential harvesting, zero-days - **FIN7**: Financial sector, POS malware, social engineering - **Lazarus Group**: Financial institutions, cryptocurrency exchanges, destructive malware - **Conti/Royal**: Ransomware operators, double extortion, RaaS model ## Workflow ### Phase 1: Pre-Engagement 1. Conduct initial scoping meeting with stakeholders 2. Identify crown jewels and critical business assets 3. Review previous security assessments and audit findings 4. Define success criteria and engagement objectives 5. Draft Rules of Engagement document ### Phase 2: Threat Modeling 1. Identify relevant threat actors using MITRE ATT&CK 2. Map threat actor TTPs to organizational attack surface 3. Select primary and secondary attack scenarios 4. Define adversary emulation plan with specific technique IDs 5. Establish detection checkpoints for purple team opportunities ### Phase 3: Operational Planning 1. Set up secure communication channels (encrypted email, Signal, etc.) 2. Create operational security (OPSEC) guidelines for the red team 3. Establish infrastructure requirements (C2 servers, redirectors, phishing domains) 4. Develop phased attack timeline with go/no-go decision points 5. Create deconfliction matrix with SOC/IR team ### Phase 4: Documentation and Approval 1. Compile engagement plan document 2. Review with legal counsel 3. Obtain executive sponsor signature 4. Brief red team operators on ROE and restrictions 5. Distribute emergency contact cards ## Tools and Resources - **MITRE ATT&CK Navigator**: Threat actor TTP mapping and visualization - **VECTR**: Red team engagement tracking and metrics platform - **Cobalt Strike / Nighthawk**: C2 framework planning and infrastructure design - **PlexTrac**: Red team reporting and engagement management platform - **SCYTHE**: Adversary emulation platform for attack plan creation ## Validation Criteria - [ ] Signed Rules of Engagement document - [ ] Defined scope with explicit in/out boundaries - [ ] Selected threat profile with mapped MITRE ATT&CK techniques - [ ] Emergency stop procedures tested and verified - [ ] Communication plan distributed to all stakeholders - [ ] Legal authorization obtained and filed - [ ] Red team operators briefed and acknowledged ROE ## Common Pitfalls 1. **Scope Creep**: Expanding testing beyond approved boundaries during execution 2. **Inadequate Deconfliction**: SOC investigating red team activity as real incidents 3. **Missing Legal Authorization**: Testing without proper signed authorization 4. **Unrealistic Threat Models**: Simulating threats irrelevant to the organization 5. **Poor Communication**: Failing to maintain contact with stakeholders during engagement ## Related Skills - performing-open-source-intelligence-gathering - conducting-adversary-simulation-with-atomic-red-team - performing-assumed-breach-red-team-exercise - building-red-team-infrastructure-with-redirectors
Related Skills
performing-threat-emulation-with-atomic-red-team
Executes Atomic Red Team tests for MITRE ATT&CK technique validation using the atomic-operator Python framework. Loads test definitions from YAML atomics, runs attack simulations, and validates detection coverage. Use when testing SIEM detection rules, validating EDR coverage, or conducting purple team exercises.
performing-red-team-with-covenant
Conduct red team operations using the Covenant C2 framework for authorized adversary simulation, including listener setup, grunt deployment, task execution, and lateral movement tracking.
performing-red-team-phishing-with-gophish
Automate GoPhish phishing simulation campaigns using the Python gophish library. Creates email templates with tracking pixels, configures SMTP sending profiles, builds target groups from CSV, launches campaigns, and analyzes results including open rates, click rates, and credential submission statistics for security awareness assessment.
performing-purple-team-exercise
Performs purple team exercises by coordinating red team adversary emulation with blue team detection validation using MITRE ATT&CK-mapped attack scenarios, real-time detection testing, and collaborative gap remediation. Use when SOC teams need to validate detection capabilities, improve analyst skills, and close detection gaps through structured offensive-defensive collaboration.
performing-purple-team-atomic-testing
Executes Atomic Red Team tests mapped to MITRE ATT&CK techniques, performs coverage gap analysis across the ATT&CK matrix, and runs detection validation loops to measure blue team visibility. Covers Invoke-AtomicRedTeam PowerShell execution, ATT&CK Navigator layer generation for heatmaps, Sigma rule correlation, and continuous atomic testing pipelines. Activates for requests involving purple team exercises, atomic test execution, ATT&CK coverage assessment, detection engineering validation, or adversary emulation testing.
executing-red-team-exercise
Executes comprehensive red team exercises that simulate real-world adversary operations against an organization's people, processes, and technology. The red team operates with stealth as a primary objective, employing the full attack lifecycle from initial reconnaissance through objective completion while testing the organization's detection and response capabilities. This differs from penetration testing by focusing on adversary emulation rather than vulnerability identification. Activates for requests involving red team exercise, adversary simulation, adversary emulation, or full-scope offensive security assessment.
executing-phishing-simulation-campaign
Executes authorized phishing simulation campaigns to assess an organization's susceptibility to email-based social engineering attacks. The tester designs realistic phishing scenarios, builds credential harvesting infrastructure, sends targeted phishing emails, and tracks open rates, click-through rates, and credential submission rates to measure human security awareness. Activates for requests involving phishing simulation, social engineering assessment, email security testing, or security awareness measurement.
executing-active-directory-attack-simulation
Executes authorized attack simulations against Active Directory environments to identify misconfigurations, weak credentials, dangerous privilege paths, and exploitable trust relationships that could lead to domain compromise. The tester uses BloodHound for attack path analysis, Mimikatz for credential extraction, and Impacket for protocol-level attacks including Kerberoasting, AS-REP Roasting, and delegation abuse. Activates for requests involving Active Directory pentest, AD attack simulation, domain compromise testing, or Kerberos attack assessment.
conducting-full-scope-red-team-engagement
Plan and execute a comprehensive red team engagement covering reconnaissance through post-exploitation using MITRE ATT&CK-aligned TTPs to evaluate an organization's detection and response capabilities.
building-red-team-c2-infrastructure-with-havoc
Deploy and configure the Havoc C2 framework with teamserver, HTTPS listeners, redirectors, and Demon agents for authorized red team operations.
validating-backup-integrity-for-recovery
Validate backup integrity through cryptographic hash verification, automated restore testing, corruption detection, and recoverability checks to ensure backups are reliable for disaster recovery and ransomware response scenarios.
triaging-vulnerabilities-with-ssvc-framework
Triage and prioritize vulnerabilities using CISA's Stakeholder-Specific Vulnerability Categorization (SSVC) decision tree framework to produce actionable remediation priorities.