官术网_书友最值得收藏!

Methodology

Red-teaming is based on the PTES standard as the foundation. However, there's much more to it. It can be said that the penetration testing activity is performed with the aim of finding as many vulnerabilities in the given amount of time as possible. However, red-teaming is performed with only one goal and by staying discreet.

The methodology used in a red-team activity involves the following:

  • Reconnaissance
  • Compromise
  • Persistence
  • Command and control
  • Privilege escalation
  • Pivoting
  • Reporting and cleanup

The following cycle basically repeats for every new piece of information that is found about the client until the goal is met:

主站蜘蛛池模板: 闵行区| 会同县| 民丰县| 东海县| 三原县| 克山县| 乐昌市| 申扎县| 固原市| 界首市| 奉新县| 瑞金市| 信宜市| 武隆县| 贵定县| 临沭县| 沾益县| 台东市| 门源| 思茅市| 阳朔县| 封丘县| 彩票| 通江县| 龙游县| 新疆| 龙海市| 昌乐县| 永寿县| 右玉县| 阿图什市| 江陵县| 高邑县| 德兴市| 华容县| 泾阳县| 保德县| 监利县| 巧家县| 阿克陶县| 苏尼特右旗|