Initial Access & Payloads
Overview
Initial access is the first foothold into the target environment. Red teams craft payloads that bypass security controls, deliver them through phishing or other vectors, and establish a C2 callback. Payload development requires understanding AV/EDR detection mechanisms and using techniques like shellcode loaders, obfuscation, and code signing to evade them.
Topics in This Section
General Approach
- Generate shellcode — msfvenom, C2 framework, or custom
- Build a loader — wrap shellcode in an evasive delivery mechanism
- Obfuscate and sign — bypass static detection and reputation checks
- Test against target's AV/EDR — verify evasion in a lab before deployment
- Deliver — phishing, web exploit, physical access, or other vector