Red Team Device Prep
Red-team hardware work looks exciting from the outside, but the reliable part is preparation. Before the engagement window opens, the device should already be...
Preparation is the quiet part of the operation
Red-team hardware work looks exciting from the outside, but the reliable part is preparation. Before the engagement window opens, the device should already be configured, labeled, charged, tested, and assigned to a specific objective. The operator should not be deciding basic setup details during the operation.
Good preparation reduces improvisation. It also makes it easier to prove that every action stayed inside the authorized scope.
Start from a known state
Every device should begin from a known firmware state. Record the firmware version, dashboard profile, device name, and any engagement-specific configuration. If the device has been used in another environment, clean it before assigning it to the new one.
This protects the client and the operator. Old scripts, old labels, and stale notes can create confusion. A clean start makes evidence easier to review and teardown easier to verify.
Use one profile per objective
Do not cram multiple unrelated scenarios into one profile. If an objective is endpoint policy validation, keep that profile focused on endpoint policy validation. If another objective is training lab demonstration, create a separate profile. The separation makes mistakes less likely and reports easier to write.
Profile names should be boring and descriptive. Use the engagement identifier, objective, and date. Avoid names that reveal sensitive target information if the device is lost or photographed.
Keep client data disposable
Temporary scripts, screenshots, test credentials, and notes should be easy to remove. Store client-specific material in approved evidence locations, not scattered across personal folders or reusable templates. If something is needed for future reference, archive it according to the engagement rules.
The device should not become a scrapbook of previous work. After closeout, remove engagement-specific data and verify the cleanup.
Build a pre-window checklist
A simple checklist catches the mistakes that cause the most pain:
- Correct firmware state.
- Correct keyboard layout.
- Correct dashboard account.
- Correct device name.
- Correct time zone.
- Approved evidence location.
- Reset and teardown plan.
- Written authorization available.
These checks are not glamorous, but they save time when the window is short.
Plan for failure
Hardware can fail. Networks can be unavailable. Batteries can drain. Dashboards can be unreachable. The prep plan should include fallback actions for each of those cases. That might mean a second device, a local-only workflow, printed contact details, or a decision to stop testing if evidence cannot be captured cleanly.
Failure planning keeps the operator from making risky choices under pressure. If a fallback is not authorized, it is not a fallback.
Close out like the operation still matters
Closeout is part of the engagement. Remove temporary access, archive approved evidence, document anything changed during testing, and confirm that no client-specific material remains in reusable profiles. The same care used during setup should appear during teardown.
Clients remember the finish. A clean closeout shows that the team treats operational discipline as seriously as technical execution.
Keep Reading
All PostsActiveMQ KEV Message Broker Review
CISA added CVE-2026-34197 for Apache ActiveMQ to the KEV catalog on April 16, 2026. The catalog describes it as an improper input validation issue that can allow code...
After Physical Access Tests
Physical access testing can create temporary changes: opened rooms, moved equipment, test accounts, evidence files, device approvals, and security alerts. The work is...
Agentic Coding Tools Need Permission Design
Agentic coding tools ask for trust constantly: read this file, edit that module, run this command, install this package, open this URL. After enough prompts, humans...