官术网_书友最值得收藏!

Methodology

Red-teaming is based on the PTES standard as the foundation. However, there's much more to it. It can be said that the penetration testing activity is performed with the aim of finding as many vulnerabilities in the given amount of time as possible. However, red-teaming is performed with only one goal and by staying discreet.

The methodology used in a red-team activity involves the following:

  • Reconnaissance
  • Compromise
  • Persistence
  • Command and control
  • Privilege escalation
  • Pivoting
  • Reporting and cleanup

The following cycle basically repeats for every new piece of information that is found about the client until the goal is met:

主站蜘蛛池模板: 渭南市| 剑阁县| 夹江县| 大连市| 涞源县| 渭南市| 霍州市| 北京市| 合阳县| 九台市| 金塔县| 浮梁县| 伊宁县| 舞钢市| 鄂伦春自治旗| 辽阳市| 瑞金市| 红安县| 巴青县| 南投市| 河间市| 抚远县| 龙海市| 吉水县| 铅山县| 松滋市| 贡嘎县| 雷山县| 奎屯市| 东至县| 五河县| 临城县| 伽师县| 临夏市| 林州市| 武邑县| 麟游县| 古浪县| 柳江县| 慈溪市| 迁西县|