How Not To Become A Red Teamer
This talk provides a career-focused overview of the transition from IT support and network engineering to professional penetration testing and red teaming. It emphasizes the importance of practical skills, such as learning through CTF platforms and mastering core tools like Wireshark and Burp Suite, over formal academic degrees. The speaker highlights the necessity of developing soft skills, including professional report writing and effective communication with clients, to succeed in a consultancy environment. The presentation also contrasts the methodologies of penetration testing with the adversarial, scenario-based approach required for red team operations.
From Help Desk to Red Team: The Reality of Skill Acquisition
TLDR: Transitioning from IT support to a red team role requires more than just certifications; it demands a shift from simple vulnerability scanning to scenario-based adversarial simulation. This post breaks down the practical path to building a red team career, emphasizing the importance of mastering core tools like Wireshark and Burp Suite over chasing degrees. Success in this field hinges on your ability to identify client problems, communicate effectively, and execute complex, stealthy operations without triggering alerts.
Most people think the path to a red team role is paved with expensive degrees and a wall of certifications. They are wrong. The industry is littered with people who can pass a multiple-choice exam but freeze when they are dropped into a live environment with a Responder instance and a mandate to move laterally without being caught. If you want to move from network engineering or help desk support into offensive security, you need to stop thinking like a scanner and start thinking like an adversary.
The Shift from Scanning to Simulation
Penetration testing is often about finding the low-hanging fruit. You run Nmap to identify open ports, you run Nessus to find missing patches, and you report the findings. That is a necessary skill, but it is not red teaming. Red teaming is scenario-based. A client does not pay you to tell them they have an unpatched service; they pay you to prove that an attacker can compromise their environment, exfiltrate data, or maintain persistence while remaining invisible to their SOC.
When you are on-site, you are not just an external auditor. You are an actor. You need to understand the network traffic you are generating. If you are running heavy scans in a busy environment, you are doing it wrong. You need to be comfortable with Wireshark to understand exactly what your tools are doing to the wire. If you cannot explain the packets your tools are sending, you have no business running them in a production environment.
Mastering the Lateral Movement Flow
The transition to red teaming requires a deep understanding of how to chain vulnerabilities. You might start with a simple Insecure Direct Object Reference (IDOR) in a web application, but that is just the entry point. The real work begins when you use that access to pivot.
Consider the classic workflow: you gain initial access, you dump credentials, and you move laterally. You might use CrackMapExec or its successor NetExec to spray credentials or execute commands across the domain. If you are dumping memory, you are likely using Mimikatz to extract clear-text credentials or NTLM hashes from LSASS.
The technical challenge is not just running these tools; it is running them in a way that does not trigger a cascade of alerts. If you are using Mimikatz on a modern, well-monitored network, you are going to get burned. You need to understand the underlying mechanics of how these tools interact with the Windows API and how EDR solutions detect them.
The Consultancy Reality: Communication and Reporting
Technical prowess is useless if you cannot articulate the risk to a client. You will spend more time writing reports than you will spend hacking. If your report is a copy-paste job from a scanner, you are failing your client. They are paying for your expertise, not your ability to run a tool.
When you find a critical vulnerability, you need to explain it in the context of their business. Why does this IDOR matter? What data can be accessed? How does this lead to a full domain compromise? If you cannot answer those questions, the client will not take your findings seriously.
Furthermore, you need to be approachable. Testing is stressful for the client. They are worried about their systems, their jobs, and the potential for a breach. If you are difficult to work with, you are not helping. You need to be the person who can explain a complex technical issue to a non-technical stakeholder without making them feel stupid.
How to Actually Get Hired
Stop waiting for a recruiter to find you. They are looking for keywords, not talent. Go to the CREST member list, filter by your region, and find the firms that actually do the work you want to do. Look up their employees on LinkedIn. Connect with them. Ask them about their work. If you have done the work—if you have spent time on Hack The Box or TryHackMe—you have something to talk about.
When you are in the interview, be honest about what you do not know. If they ask you about a tool you have never used, admit it, but explain how you would go about learning it. They are not looking for someone who knows everything; they are looking for someone who can learn, adapt, and solve problems under pressure.
Finally, remember that the best in the room has no one to learn from. If you find yourself in a position where you are the smartest person in the room, it is time to move on. Find a team that challenges you, a firm that pushes you to learn new techniques, and a role that forces you to grow. The moment you stop learning is the moment you stop being an effective red teamer. Keep your skills sharp, keep your curiosity high, and never stop looking for the next, harder problem to solve.
Vulnerability Classes
Target Technologies
Attack Techniques
OWASP Categories
Up Next From This Conference

5 Gaps Exposed In 30+ Real-World Tabletop Exercises

LLMs for Vulnerability Discovery: Hacking Like Humans (Without Humans)

Playing Peekaboo with Runtime in CI/CD Pipelines
Similar Talks

Kill List: Hacking an Assassination Site on the Dark Web

Firewalls Under Fire: China's Ongoing Campaign to Compromise Network Protection Devices

