casp3r0x0@home:~$

Chain Of Success For Red Teamer In 2026

About

In this blog, I will introduce a philosophy for red teamers that I call it Chain of Success Framework - a structured methodology designed to measure how effective and mature a red team truly is.

I developed this framework independently. The motivation was straightforward: there is no standardized measurement to evaluate how capable a red team is when it comes to conducting real-world offensive operations.

Every phase included in this framework focuses exclusively on the team’s ability to achieve impact and accurately simulate real APTs and nation-state adversaries. The higher your team scores, the more operationally capable you are.

This blog post is based on my experience and personal opinion.

Figure 1


1. Initial Access

I have divided the initial access phase into the following categories:

  • Zero-Day / N-Day Exploitation
  • Phishing
    • Credential harvesting using private or heavily modified tools — must be fully undetectable.
    • Remote code execution via proprietary techniques or well-known methods that are highly customized to evade detection.
  • OSINT — focused on leaked data and credentials for the target organization.

1.1 Zero-Day / N-Day Exploitation — Max Points: 60

Philosophy

This capability is extremely difficult for small-to-medium tier red teams. It requires a well-funded team with dedicated time and resources for vulnerability research or N-day exploit development. An N-day vulnerability refers to a flaw that has been discovered and patched but for which no public exploit exists. These are among the most impactful exploits because organizations often delay patching. Some elite research teams can rediscover a vulnerability and develop a working exploit within a single day.

At this stage, the red team should already have ready-to-deploy exploits in their arsenal.

Scoring

Criteria Points
Exploit targets a well-known product 60
Exploit targets a less common application used by the target 50
Exploit generates some alerts 40
No exploit capability 0

Detections

When developing exploits, OPSEC must be a primary consideration. No IOCs should be generated that could alert the SOC team, unless it is absolutely necessary for the exploit to function.

Tools / Resources

A dedicated research team focused exclusively on vulnerability research and exploit development.


1.2 Phishing

1.2.1 Credential Harvesting — Max Points: 10

Philosophy

Credential harvesting should utilize in-house developed or heavily modified tools. The tooling must be fully undetectable.

Scoring

Criteria Points
Tool is custom-built and undetected 10
Tool has known detections 0

Detections

CTI platforms, threat intelligence tools, firewalls, and email gateway security solutions (e.g., Proofpoint).

Tools / Resources

Build a custom tool capable of bypassing MFA and harvesting credentials from any target website — not limited to Microsoft or other well-known platforms.


1.2.2 Remote Code Execution — Max Points: 30

Philosophy

The red team must have the ability to gain code execution while bypassing EDRs, CTI, firewalls, IDS, IPS, NDS, and SOC monitoring. Deduct 10 points if using a well-known or commercial C2 framework is used, even if the loader itself is undetected. for example shortcut link to RCE but it is undetectable delivered as phishing.

Scoring

Criteria Points
Code execution method is novel 30
Some EDRs can block or detect the method with special configruation 20
Uses a well-known TTP but no current detections exist 10
Detected by at least 3 well-known EDRs 0

Detections

EDRs, CTI, firewalls, IDS, IPS, NDS, SOC monitoring.

Tools / Resources

An in-house C2 framework with the capability to bypass any EDR on the market. I do not recommend purchasing commercial C2 frameworks, as most of them are heavily signatured. The time and effort required to make a commercial beacon undetectable including Cobalt Strike .


1.3 OSINT — Leaked Credentials — Max Points: 10

Philosophy

The team must have the ability to search for leaked credentials on the dark web. In most cases, if the target organization has a mature security posture, there will be minimal leaked credentials. However, overlooked third-party credential leaks are always worth investigating.

A common scenario: a user signs into their personal Gmail account on both their corporate laptop and personal device, saving credentials via Google Password Manager. If the personal device is compromised, all synced credentials — including corporate ones — are exposed.

Scoring

Criteria Points
Access to platforms such as Flare, Resecurity, or Recorded Future 10
No access to any CTI platform 0

Detections

If the target has a robust CTI program, they may identify and remediate leaked credentials before the red team can leverage them.

Tools / Resources

Flare, Resecurity, Recorded Future (for use during red team operations).


2. Exfiltration & C2 Communication Channel — Max Points: 25

Philosophy

During a red team engagement, once you land on a machine with an EDR and successfully bypass it, the C2 will begin beaconing traffic. You must remain undetectable. In mature environments, consider setting the sleep interval to once per day — the C2 checks for new commands only once within a 24-hour period.

Scoring

Criteria Points
C2 communication uses well-known, legitimate network traffic patterns 10
Slow command execution (high sleep intervals) 5
Utilizing target-owned domains for C2 infrastructure 10

Detections

IPS, IDS, SOC monitoring, CTI.

Tools / Resources

Custom-developed external C2 channels for your in-house C2 framework or as extensions for commercial C2 platforms.


3. Post-Exploitation — Max Points: 50

Credential Stealers

Philosophy

All of the following capabilities must be tested and confirmed to be undetected by well-known IOC signatures and EDR solutions.

Scoring

Capability Points
Chromium-based browser credential stealers (Edge, Chrome) 10
Password vault stealers (1Password, Bitwarden, etc.) 10
Cookie stealers 10
Keyloggers 10
Hidden VNC 10

Detections

SOC monitoring, EDRs.

Tools / Resources

Custom-implemented modules within your C2 framework (in-house or commercial) with proprietary techniques.


4. Lateral Movement — Max Points: 40

Philosophy

The red team must be able to move within the target network without triggering any detections. This requires custom implementations for lateral movement techniques to minimize IOCs and avoid alerting defensive teams.

Scoring

Criteria Points
Lateral movement technique is novel 40
Lateral movement technique is undetected 30
Using built-in or publicly known lateral movement methods 0

Detections

EDRs, SOC monitoring.

Tools / Resources

Develop a custom lateral movement technique that is undetected by modern security solutions.


5. LSASS / SAM Dump — Max Points: 60

Philosophy

In certain scenarios, the engagement reaches a dead end — no exploitable vulnerabilities and no misconfigurations available for privilege escalation. In these situations, dumping LSASS or SAM becomes essential to enable lateral movement or achieve privilege escalation.

Scoring

Criteria Points
Using a novel TTP to dump LSASS and SAM 60
Using BYOVD (Bring Your Own Vulnerable Driver) — blind the EDR without killing it 60
Using BYOVD — killing or suspending the EDR process 40

Detections

EDRs, SOC monitoring.

Tools / Resources

Custom-developed tools leveraging novel TTPs or BYOVD techniques. The preferred approach is to blind the EDR’s ability to observe malicious activity rather than terminating the EDR process entirely.


6. Persistence — Max Points: 30

Philosophy

You need to maintain access within the network for as long as possible without any detection.

Scoring

Criteria Points
Novel persistence technique 30
Undetectable persistence technique 20
Standard persistence that could be detected by some EDRs 0

Detections

EDRs, SOC monitoring.

Tools / Resources

Custom BOF (Beacon Object File) or plugin to execute persistence mechanisms.


Chain of Success — Red Team Maturity Scoring Table

Phase Sub-Phase Max Points Elite (275–315) Advanced (180–274) Intermediate (80–179) Beginner (0–79)
Initial Access Zero-Day / N-Day (well-known product, no alerts) 60 60 50 (less common app) 40 (generates alerts) 0 (no exploit)
Initial Access Phishing — Credential Harvesting (custom undetected tool) 10 10 10 0 (tool has detections) 0
Initial Access Phishing — RCE (novel method, custom C2) 30 30 20 (some EDRs detect) 10 (known TTP, no detection) 0 (detected by 3+ EDRs)
Initial Access OSINT — Leaked Credentials (CTI access) 10 10 10 10 0 (no CTI access)
Exfil & C2 Comms Legitimate traffic + slow execution + target domains 25 25 (all three) 15 (traffic + slow exec) 10 (traffic only) 0
Post-Exploitation Chromium browser credential stealers 10 10 10 10 0
Post-Exploitation Password vault stealers 10 10 10 0 0
Post-Exploitation Cookie stealers 10 10 10 10 0
Post-Exploitation Keyloggers 10 10 10 0 0
Post-Exploitation Hidden VNC 10 10 0 0 0
Lateral Movement Custom lateral movement technique 40 40 (novel) 30 (undetected) 0 (built-in tools) 0
LSASS / SAM Dump Novel TTP or BYOVD (blind EDR) 60 60 (novel TTP) 40 (BYOVD kill EDR) 0 0
Persistence Custom persistence mechanism 30 30 (novel) 20 (undetectable) 0 (detected by EDRs) 0
  TOTAL 315 ~315 ~235 ~90 ~0

Tier Summary

Tier Points Range Description
Elite 275 – 315 Full zero-day capability, custom C2, novel TTPs across all phases. Nation-state or top-tier private red team level.
Advanced 180 – 274 Strong custom tooling, some novel techniques, BYOVD capability. Well-funded professional red team.
Intermediate 80 – 179 Uses known TTPs with modifications, limited zero-day or novel capability. Growing team with some custom tools.
Beginner 0 – 79 Relies on public tools and built-in OS features. Detected by most EDRs. No exploit development or custom C2.