Let’s again, time travel to 2003 with today’s tools and own everything. This talk takes you inside the red teams at the North East, Mid Atlantic, Pacific Rim, and National Collegiate Cyber Defense competition events. This talk is a revolution compared to last years Dirty Red Team Tricks. Each year, the students up their game and the red team does as well. You’ll learn how sophisticated bots allowed these red teams to persist deeply, automatically harvest plain-text credentials, and scale their efforts during these events. Once again, you’ll catch some niftier persistence tricks in UNIX and Windows. If you defend networks or play in these events, come and see what others are using on you. If you think you’ll find yourself on a red team, you need to come to this talk.