- Hands-On Red Team Tactics
- Himanshu Sharma Harpreet Singh
- 101字
- 2021-08-13 15:36:45
Planning a red-team exercise
The red-team exercise is not just a mere pentest; it's an adversary attack simulation exercise that allows us to assess the following:
- If the organization can detect the attack or not
- If an organization is able to contain/ restrict the attack after detection
- If the organization can protect their business critical assets from the red teamers or not
- How the defenders of an organization perform an incident response in the event of such attacks
Before getting into the planning phase of the red-team exercise, first you need to understand the concept of the cyber kill chain.
推薦閱讀
- 網(wǎng)絡(luò)工程設(shè)計(jì)與安裝
- 大東話安全之網(wǎng)絡(luò)病毒篇
- 網(wǎng)頁制作教程
- IP語音通信原理、設(shè)計(jì)及組網(wǎng)應(yīng)用
- 中文版Dreamweaver CC基礎(chǔ)培訓(xùn)教程(移動(dòng)學(xué)習(xí)版)
- P2P網(wǎng)絡(luò)測量與分析
- 地理信息系統(tǒng)分析與實(shí)踐教程
- 信息主導(dǎo)論
- Axure RP 9 高保真原型設(shè)計(jì)實(shí)例教程
- Instant Edublogs
- 深入淺出ASP.NET Core
- JavaScript+jQuery前端開發(fā)基礎(chǔ)教程(微課版)
- Python Network Programming
- INSTANT Migration to HTML5 and CSS3 How-to
- 云原生:運(yùn)用容器、函數(shù)計(jì)算和數(shù)據(jù)構(gòu)建下一代應(yīng)用