Campaign Planning
Overview
Campaign planning defines the scope, objectives, threat model, and rules of engagement before a red team operation begins. A well-planned campaign aligns the red team's activities with the organization's security goals, ensures legal authorization, and establishes clear communication channels. Planning directly determines whether the engagement produces actionable results or just a list of findings.
ATT&CK Mapping
- Tactic: TA0043 - Reconnaissance
- Technique: T1591 - Gather Victim Org Information
Techniques
Defining Objectives
Red team objectives should focus on answering security questions, not just "get Domain Admin":
- Detection testing — can the SOC detect lateral movement within 4 hours?
- Response testing — does the IR team follow their playbook when a C2 beacon is found?
- Control validation — can an attacker exfiltrate sensitive data despite DLP controls?
- Crown jewel access — can an attacker reach PCI data / source code / executive email?
Rules of Engagement (RoE)
Document and get signed approval for:
1. Scope
- In-scope IP ranges, domains, systems
- Explicitly out-of-scope systems (production databases, medical devices, etc.)
- Authorized attack types (phishing, physical, network, web)
2. Boundaries
- No denial-of-service
- No destructive actions (ransomware simulation without encryption)
- No access to specific data types (PII, patient records)
- Working hours restrictions (if any)
3. Authorization
- Signed authorization letter from executive sponsor
- Emergency contacts (red team lead, blue team lead, legal)
- Deconfliction process — how to verify if detected activity is the red team
- "Get out of jail free" letter for physical engagements
4. Communication
- Status update frequency
- Immediate notification triggers (critical vulns, active breach detected)
- Secure communication channel between red team and stakeholders
Threat Model Selection
Choose an adversary profile to emulate:
| Threat Actor Type | TTPs | Dwell Time | Sophisttic. |
|---|---|---|---|
| Opportunistic criminal | Phishing, commodity malware, ransomware | Days | Low |
| Targeted criminal (FIN groups) | Spear-phishing, custom tools, POS malware | Weeks | Medium |
| Nation-state (APT) | Zero-days, supply chain, custom implants | Months | High |
| Insider threat | Legitimate access, data exfiltration | Ongoing | Varies |
Use MITRE ATT&CK to map the selected threat actor's known TTPs and build your attack plan around them.
Infrastructure Planning
Before the engagement begins, plan and build:
- C2 framework selection (Sliver, Cobalt Strike, Mythic, Havoc)
- Domain acquisition and categorization (1-2 weeks lead time)
- SSL certificate setup (Let's Encrypt or purchased)
- Redirector deployment (cloud VPS, CDN)
- Payload development and testing
- Communication channels (encrypted chat for the red team)
- Data handling procedures (how captured data is stored/destroyed)
Attack Plan
Structure the operation in phases:
Phase 1: Reconnaissance (Week 1)
- OSINT on target organization
- Identify external attack surface
- Map employee roles for phishing targets
Phase 2: Initial Access (Week 2)
- Deploy phishing campaign OR exploit external service
- Establish initial C2 beacon
Phase 3: Post-Exploitation (Weeks 2-3)
- Enumerate internal environment
- Escalate privileges
- Establish persistence
- Move laterally toward objectives
Phase 4: Actions on Objectives (Weeks 3-4)
- Access crown jewels
- Demonstrate data exfiltration
- Document detection gaps
Phase 5: Reporting (Week 5)
- Compile timeline of actions
- Document detection vs. non-detection
- Deliver findings and recommendations
Deconfliction
Establish a process to confirm whether detected activity belongs to the red team:
- Unique deconfliction code known only to red team lead and designated blue team contact
- Dedicated phone number or encrypted channel
- Red team logs all actions with timestamps for correlation
- Never reveal red team actions to SOC analysts during the engagement
Detection Methods
How Blue Teams Detect Planning
- Registration of new domains similar to the organization's branding
- SSL certificate transparency logs revealing new attacker domains
- Reconnaissance activity (LinkedIn scraping, job posting enumeration)