01 / 17
ADVERSARIAL OPERATIONS TRAINING SERIES — MODULE 1
ADVERSARIAL
TRADECRAFT
Operational Security & Effectiveness
← → arrow keys  ·  swipe  ·  click arrows to navigate
00
Context — Before We Start
Why Operations Fail
"Most operations aren't burned by sophisticated detection. They're burned by predictable, avoidable mistakes."
THE GOAL
Build operations where failure requires an adversary to be both skilled and lucky — not merely patient.
THE STANDARD
A forensic investigator should find nothing. Not "very little." Nothing. That is the only acceptable outcome.
01
Principle 01
Separate Your
Working Environment
Keep engagement data, credentials, and tooling isolated from your daily machine and from each other.
THE PRACTICAL REASON
Mixing engagement data across clients or machines creates data handling risk — and a messy incident if your laptop is lost or your VM is compromised. Clean separation protects you and the client.
COMMON FAILURE
Verbose tool output prints full paths, credentials, and target names to a terminal session that gets screenshotted, screen-recorded, or logged. What's on screen during an op is part of your data handling posture.
02
Principle 02
Cleanup Is Doctrine,
Not Afterthought
Self-cleaning tools are better than tools with cleanup steps. The best evidence is evidence that was never written.
KEY DISTINCTION
Cleanup by file name requires remembering what you deployed.

Cleanup by time window removes everything changed in the last N hours — including what you forgot to track.
GOLD STANDARD
Persistence fires → executes payload → deletes the trigger, the payload, the persistence mechanism, and itself. A forensic investigator finds only the process — not how it arrived.
03
Principle 03
Map EDR Coverage.
Operate in the Gaps.
Study detection rules before you arrive. Know what the SOC actually alerts on — not what you assume it alerts on.
Detection Rules (Sigma/Elastic) READ BEFORE OP
EDR Userland Hooks (NTDLL) BYPASS W/ SYSCALLS
ETW Telemetry Providers KNOW WHICH ARE CONSUMED
COM / WMI / DCOM LOWER COVERAGE
BOF In-Process Execution NO PROCESS CHAIN
ALTITUDE NUMBER RECON
C:\Windows\System32\Drivers listings reveal every installed minifilter. Each has an altitude in the 3xxxx–4xxxx range. Cross-reference against public altitude databases to identify CrowdStrike, SentinelOne, Defender, etc. — passively, before running anything.
04
Principle 04
Blend Into
the Environment
The less you look like an attacker, the less you'll be detected as one. The disguise must be exact, not approximate.
  • No disguise — trivially identifiable
  • ~Approximate match — fails close inspection
  • Exact metadata match — passes casual audit
  • ✓✓OS-native mechanism — no disguise needed at all
NAMING DISCIPLINE
Registry values that look like GUIDs, services named after real Windows components, exports named after legitimate DLL entry points. The investigator's eye skips what looks familiar.
05
Principle 05
Know Your Target
Before You Act
Survey before you deploy. The environment determines what you use. Blind deployment is how engagements go sideways.
COHABITATION IN PRACTICE
Red teams have landed on networks actively being worked by real threat actors. If you trigger their tooling, modify shared footholds, or appear in the same logs, the client's IR team cannot distinguish your activity from the real incident. Survey before you deploy — every time.
WHAT TO LOOK FOR
Odd persistent processes · standard persistence you didn't create · C2 beacon timing patterns from unexpected binaries · modified system files · known APT IOCs in running processes or network connections.
06
Principle 06
C2 Channel Discipline
The most detectable moment is first contact. Design every aspect of your C2 around defeating that detection window.
SOCKS AS COVER
Lateral recon through a SOCKS proxy looks like the compromised user browsing internal apps. Direct tool connections from your implant create new, distinct traffic signatures. One of these is invisible — the other is not.
THE SLEEP PRINCIPLE
A 10-second delay before first callback is invisible to a human analyst. It defeats every behavioral sandbox that flags on an immediate post-exploit outbound connection.
07
Principle 07
Build In
Fail-Safe Mechanisms
Every capability you deploy needs an exit. Build it before deployment — not after something goes wrong.
BURN SEQUENCE PRINCIPLE
One command → implant removes its persistence, its artifacts, and itself, then confirms completion.

If the burn requires more than one operator action, it will eventually be done only partially — under pressure, the last step gets skipped.
COMMANDEERING RISK
Without cryptographic command authentication, a discovered implant can be turned and used against you. Sign every command batch. Verify before executing.
08
Principle 08
Depth Over Speed.
Patience Is a Technique.
Rushing recon creates behavioral signatures. Knowing the environment better than the defenders takes time — and that time pays off.
CADENCE IN PRACTICE
Automated hourly artifact sweep + manual log verification = two independent cleanup passes. The automated pass catches everything. The manual pass confirms the automated pass worked. Neither is optional.
CONFIGURABLE BY DESIGN
Sleep durations, beacon intervals, and cleanup windows should all be operator-tunable per deployment — not hardcoded. Different targets demand different timing postures.
09
Principle 09
Layer Everything.
No single point of failure. No single point of detection. Discovery of one component reveals nothing about any other.
COMPARTMENTATION IN PRACTICE
If a network driver is detected and removed, the persistence mechanism should be unaffected — and vice versa. The investigator who finds the driver learns nothing about the persistence, and nothing about C2.
THE FRAMEWORK PRINCIPLE
Components coordinate locally. The operator sees results, not component state. The framework handles redundancy; the operator handles the mission.
10
Principle 10 — Before You Touch Anything
Pre-Access OSINT
Public data shapes the entire operation. The best recon happens before you send a single packet.
JOB POSTING RECON
"Senior CrowdStrike Falcon Engineer — must tune exclusions and manage policies" tells you: Falcon is deployed, actively managed, and has exclusions. "No prior EDR experience required" tells the opposite. All from a public listing.
LAB VALIDATION
Once you know the target EDR from OSINT, spin it up in a lab. Test your full toolchain before it runs on the engagement. A technique that trips CrowdStrike in the lab will trip it live — find out before it counts.
11
Principle 11 — Once You're In
Post-Access:
Read the Environment
Every compromised host is an intelligence platform. Passive local recon gives you the full map before you move.
SOCKS FOR INTERNAL BROWSING
Use implant SOCKS to access SharePoint, Confluence, wikis, and intranet portals through the user's existing session. Traffic looks like normal user web activity — not tool traffic, not scanner traffic. Internal documentation often contains network diagrams, credentials, and infrastructure details that no enumeration script will find.
POST-RECON DECISION POINTS
Before moving: Is escalation worth the risk here, or is lateral movement quieter? Should C2 stay on this host or relocate? What pretext opportunities has this host revealed? Outlook metadata and Slack history answer all three.
12
Principle 12 — Cloud-Joined & Hybrid Environments
Cloud & Identity
Reconnaissance
Modern environments authenticate through cloud identity layers. Understand the token infrastructure before touching anything.
TOKEN REUSE PATH
Cloud-joined host → extract tokens from browser/app cache → request access to Graph, SharePoint, Teams, Exchange → full org recon under the existing user identity. Defender sees normal authenticated API calls, not exploitation activity.
GRAPH AS RECON
A standard user token can enumerate all users, groups, roles, device registrations, and conditional access policies via Graph API. No elevated privilege. No LDAP queries. No AD traffic. All HTTPS to microsoft.com — indistinguishable from legitimate app behavior.
13
Principle 13
Stay Hidden
From EDR Telemetry
EDR visibility depends on telemetry pipelines. Understand those pipelines and you understand what gets seen — and what doesn't.
ETW PATCHING IN PRACTICE
Many EDRs rely on Microsoft-Threat-Intelligence and other ETW providers for process injection and shellcode telemetry. Patching the EtwEventWrite function in a specific process removes that process from the EDR's telemetry — without touching the EDR itself.
THE ANOMALY PRINCIPLE
DFIR works by finding things that don't fit. Timestamps out of order, DLLs loaded from temp paths, processes with no parent. Produce no anomalies and there is nothing to anchor the investigation.
Lessons From Failure
What Actually
Burns Operations
These failure modes appear in real, sophisticated operations. They share a single common cause.

HARDCODED FALLBACK VALUES

A shortcut taken under time pressure — a jokey test string, a fixed default key — ships into production and stays there. Every deployment using that fallback is identically keyed.

VERBOSE OUTPUT DURING LIVE OPS

Debug-grade tool output prints full paths, hostnames, and credentials to a terminal that gets screen-recorded or logged. What's visible on screen during an op is part of your data handling posture.

CLEARTEXT OPERATIONAL NOTES

Target hostnames, credentials, and tactical decisions written to unencrypted notes on the operator machine. If the machine is lost or compromised mid-engagement, the notes hand the client a full record of the op.

INCONSISTENT HARDENING

95% of the framework is hardened. A single config file, a single default value, a single code path that was "good enough for testing" is the entry point for reversal or attribution.

OPERATOR HOSTNAME IN TARGET LOGS

RDP to a target logs your source hostname in Windows Security Event 4624. A VM named "KALI-PENTEST" or a personal MacBook hostname appearing in auth logs is direct attribution. Rename machines before every engagement — not after access is established.

THE COMMON CAUSE
Every failure mode above results from treating operational security as a preference that can be traded off under pressure — rather than as a non-negotiable constraint on every decision, at every stage.
The Meta-Principle — Above All Others
Opsec That Depends
on Memory Will Fail
The framework enforces operational security. The operator executes the mission. These are not the same job.
"Operations that succeed at scale succeed because failure is architecturally difficult — not because operators never make mistakes."
  • Self-cleaning tools > tools with cleanup checklists that depend on memory
  • Encrypted storage enforced by default > "remember to encrypt your notes"
  • Automatic timestamp matching at install > "don't forget to match timestamps"
  • Signed, authenticated commands > "only send commands through secure channels"
  • Built-in exposure timers > "remember to remove the implant when the op ends"
  • If opsec requires the operator to do the right thing every time, it will eventually fail
Quick Reference — All Principles
The 13 Principles of Adversarial Tradecraft
01
SEPARATE ENVIRONMENTS
Dedicated VM per engagement. Encrypted vaults. Clean up when the op ends.
02
CLEANUP IS DOCTRINE
Self-cleaning tools. Time-window sweeps. Automated first, manual verification second.
03
MAP EDR COVERAGE
Detection rules, altitude recon, BOFs, direct syscalls, MITRE evals, lab validation.
04
BLEND IN
Exact metadata match. OS-native mechanisms. Opaque identifiers. No novel patterns.
05
SURVEY FIRST
Enumerate defenses. Watch for cohabitation with real threats. Environment drives tool selection.
06
C2 DISCIPLINE
Sleep before first contact. SOCKS for internal recon. Mirror browser UA. Unique IDs per deployment.
07
FAIL-SAFES
One-action burn. Exposure timers. Cryptographic command auth. Upgrade path built in.
08
DEPTH OVER SPEED
Fixed cadence. Automated sweeps. Timing tuned per target. Silence is deliberate.
09
LAYER EVERYTHING
Independent mechanisms. Compartmented components. Discovery of one reveals nothing.
10
PRE-ACCESS OSINT
LinkedIn, job postings, GitHub, Shodan. Know the stack and defenders before touching anything.
11
POST-ACCESS RECON
Driver altitudes, PS history, browser bookmarks, comms history, DNS cache. Read the host before moving.
12
CLOUD & IDENTITY
PRT extraction, Bearer token reuse, Graph API recon. Cloud auth layers leave fewer audit trails.
13
HIDE FROM EDR
ETW patching, direct syscalls, timestamp matching. Know the telemetry pipeline and what removes you from it.
THE META-PRINCIPLE
The framework enforces opsec. The operator executes the mission. Failure must be architecturally difficult.