Red Teaming

Caldera: Red Team Emulation (Part 1)

This article aims to demonstrate an open-source breach & emulation framework through which red team activity can be conducted with ease. It focuses on MITRE simulation and has tons of other functions that can be used in the activity.

Table of Contents

MITRE Att&ck


  • Pre-requisite & dependencies
  • Interface
  • Installation
  • Plugins


  • Step1: Deploy an Agent
  • Step2: Abilities
  • Step3: Setting up Operations
  • Step4: Exporting the result


Mitre Att&ck

Mitre framework provides a list of all the Tactics, Techniques and Procedure (TTPs) & their corresponding sub-techniques arranged in a well-structured form which can be used in red team activities.



CALDERA breach & emulation tool designed to easily automate adversary emulation, assist manual red-teams and automate incident response.

The framework consists of two components:

The core system: This is the framework code, consisting of what is available in this repository. Included is an asynchronous command-and-control (C2) server with a REST API and a web interface.

Plugins: These repositories expand the core framework capabilities and provide additional functionality. Examples include agents, reporting, collections of TTPs and more.

Pre-requisite & dependencies

These requirements are for the computer running the core framework:

  • Any Linux or MacOS
  • Python 3.7+ (with Pip3)
  • Recommended hardware to run on is 8GB+ RAM and 2+ CPUs
  • Recommended: GoLang 1.17+ to dynamically compile GoLang-based agents.


Follow these steps for setting up caldera:

git clone --recursive

cd caldera
pip3 install -r requirements.txt
python3 –insecure


Caldera provides web interface which is simple to navigate and use.
username: red
Password: admin


The Plugins category offers a list of all current plugins and allows you to quickly and easily access their functionality.

  • Access (Red team initial access tools and techniques)
  • Atomic (Atomic Red Team project TTPs)
  • Builder (Dynamically compile payloads)
  • CalTack (embedded ATT&CK website)
  • Compass (ATT&CK visualizations)
  • Debrief (Operations insights)
  • Emu (CTID emulation plans)
  • Fieldmanual (Documentation)
  • GameBoard (Visualize joint red and blue operations)
  • Human (Create simulated noise on an endpoint)
  • Manx (Shell functionality and reverse shell payloads)
  • Mock (Simulate agents in operations)
  • Response (Incident response)
  • Sandcat (Default agent)
  • SSL (Enable HTTPS for caldera)
  • Stockpile (Technique and profile storehouse)
  • Training (Certification and training course)

To know more about a particular plugin, follow the link.


Agents, adversaries, and operations make up the Campaigns category, which may be used to build up the numerous agents, adversaries, and operations needed for a red team operation or adversary emulation.

Step1: Deploy an Agents

To begin with initial access we need to implant an agent inside the target system.

To set up an agent or listener:

In the campaign tab, click on agents

Choose an agent (3 types currently available)

Choose the platform (Windows, Linux or Darwin [mac OS])

As soon as the platform is selected, you need to set up the IP, Port & name of the implant

It will also give a set of commands needed to be executed on the target

In the case of Linux/Mac OS, execute it on terminal

Deploy agent inside the target machine by simple copy-paste

In the case of Windows, execute it on PowerShell (Bypass the execution policy first)

Deploy agent inside the target machine by simple copy-paste.

The agent pops back onto the caldera which specifies the command which was executed on the victim end was successful

Step2: Abilities

An ability is a specific ATT&CK tactic/technique implementation which can be executed on running agents. Abilities will include the command(s) to run, the platforms/executors the commands can run on (ex: Windows / PowerShell), payloads to include, and a reference to a module to parse the output on the CALDERA server.

As you can see in the above ss, we can select Platform and related TTP. Let us take a discovery as a tactic & Linux as a platform (the same tactic demonstrated for windows in this article)

Step3: Setting up Operations

After setting up the agent, now it is time to run the abilities or the set of instructions as shown above. For this, we need to set up an operation

To do this:

  • Under the Campaigns tab, select operations
  • Choose Create operations

Choose the adversary (Adversary Profiles are collections of ATT&CK TTPs, designed to create specific effects on a host or network. Profiles can be used for offensive or defensive use cases.)

Fill in the details and specifications of the operation you want to run

Click on start, after a while, you can see that it starts running and populating the results on the screen

As you can see, all set of commands running is obfuscated in base64nopadd format (also you can select other options specified), we can also see the command and we can view the output of the command (Also, we can see the status of the task performed)

Step4: Exporting the result

After the activity has been completed, we can extract the report in two ways:

  • Directly from the download tab which appears after an operation is completed

Go to debrief tab, choose the pointers to be included in the report; then download the full report as a PDF


We have thus been able to perform the adversary simulation with the help of Caldera. Using this framework, Red/Purple team activities can be easily performed.


Author: Ankit Sinha is a security researcher with expertise in Pentesting, Threat hunting and red teaming. Also, likes to work on a Myriad of things in the discipline of offensive security. Contact here