1. The Core Architecture (The "Why" and "How")

1.1 The Purpose of Networking

Networking is not merely connectivity—it is an abstraction system enabling:

From a red team perspective:

Every abstraction layer introduces trust boundaries and attack surfaces.


1.2 OSI Model vs TCP/IP Stack

OSI Model (Conceptual – 7 Layers)

Layer Function Red Team Relevance
7 Application User-facing protocols Data exfiltration
6 Presentation Encoding, encryption TLS weaknesses
5 Session Session mgmt Token/session hijacking
4 Transport End-to-end comms Port scanning
3 Network Routing IP spoofing
2 Data Link Local delivery ARP poisoning
1 Physical Bits on wire Rarely targeted

TCP/IP Stack (Practical – 4 Layers)

Layer Maps to OSI
Application 5–7
Transport 4
Internet 3
Network Access 1–2

Where Software Ends vs Hardware Begins

Key insight:

Red teamers exploit mismatches between kernel behavior and application assumptions.


1.3 Packet Lifecycle (Encapsulation)

Outbound:

Application Data
→ TCP Segment
→ IP Packet
→ Ethernet Frame
→ Bits on wire

Inbound: Reverse process (decapsulation)

Critical Observations:


2. The Red Teamer's Toolkit: Essential Topics

2.1 Layer 2 (Data Link)

MAC Spoofing

ARP Poisoning (Core MITM Primitive)

Attack:

Victim → Attacker: "Who is gateway?"
Attacker → Victim: "I am gateway"

Result:

VLAN Hopping


2.2 Layer 3 (Network)

IP Addressing

Subnetting (CIDR)

Example:

192.168.1.0/24 → 256 hosts

ICMP Tunneling


2.3 Layer 4 (Transport)

TCP 3-Way Handshake

SYN → SYN-ACK → ACK

Abuse cases:

UDP

Port Scanning Mechanics


2.4 Layer 7 (Application)

DNS (High-Value Target)

data.attacker.com

HTTP/S

SSH Tunneling

SMTP


3. Network Technologies & Infrastructure

3.1 Hardware Behavior

Device Function Security Implication
Hub Broadcast Easy sniffing
Switch MAC-based forwarding ARP attacks needed
Router IP routing ACL bypass attempts
Firewall Traffic filtering Evasion focus

Firewalls

Red team focus:

Craft packets that appear legitimate within state tables.


3.2 Critical Protocols

DHCP (Dynamic Host Configuration Protocol)

Attack:

DNS

BGP (Border Gateway Protocol)


4. Offensive Principles & Technologies

4.1 Post-Exploitation Networking

Pivoting

Port Forwarding

Attacker → Compromised Host → Internal Service

Tools:


4.2 Network Sniffing

Tools:

Skills:


4.3 Man-in-the-Middle (MITM)

Core idea:

Intercept → Inspect → Modify → Forward

Techniques:


5. Additionals (Modern Stack)

5.1 Software-Defined Networking (SDN)

Cloud Networking

AWS VPC

Azure VNets

Red team implication:

Misconfigurations replace traditional vulnerabilities.


5.2 Zero Trust Architecture

Principle:

"Never trust, always verify"

Implications:

For red teamers:


6. Key Areas for Transition (Developer → Red Teamer)

6.1 Scanning & Enumeration


6.2 Protocol Weaknesses

High-risk protocols:

Focus:

Read RFCs, not just tool docs.


6.3 Active Directory Networking

Critical protocols:

Kerberos

LDAP

SMB


Execution Strategy (Practical Path)

Phase 1 (Weeks 1–3)

Phase 2 (Weeks 4–6)

Phase 3 (Weeks 7–10)

Phase 4 (Weeks 11–14)

Phase 5 (Ongoing)


Final Observation

A strong red teamer in networking: