- Hands-On Penetration Testing with Kali NetHunter
- Glen D. Singh Sean Philip Oriyano
- 177字
- 2021-07-02 12:38:33
Red team
The goals of the red team are quite different from the blue team. The red team focuses on continuously attacking the organization's systems and networks. You may be wondering why a team with such objectives would even exist. As mentioned earlier in Chapter 1, Introduction to Kali NetHunter, hackers are always trying gain to unauthorized access into another person’s or company’s systems for various reasons. However, unauthorized access into another system or network is illegal as it is intrusive. Organizations need to continue improving their security posture due to the growing threat landscape in the digital world.
The red team is either external contractors or an in-house team whose objective is to continuously simulate real-world cyberattacks. This is to ensure all vulnerabilities are discovered and to determine how each can be exploited by a real, malicious hacker. The red team are like the black hat hackers who are contracted by an organization to discover all hidden vulnerabilities, exploit any flaws, and provide a detailed report at the end of their testing.
- 科技安全:戰略實踐與展望
- Metasploit Penetration Testing Cookbook(Third Edition)
- INSTANT Windows PowerShell
- Kali Linux Wireless Penetration Testing Cookbook
- ARM匯編與逆向工程:藍狐卷·基礎知識
- 網絡安全能力成熟度模型:原理與實踐
- 從實踐中學習Kali Linux滲透測試
- 互聯網企業安全高級指南
- 先進云安全研究與實踐
- Cybersecurity Threats,Malware Trends,and Strategies
- 黑客攻擊與防范實戰從入門到精通
- 交換機·路由器·防火墻(第2版)
- 聯邦學習原理與算法
- 互聯網域名國際化與安全技術導論
- 深入探索區塊鏈