- Hands-On Penetration Testing with Kali NetHunter
- Glen D. Singh Sean Philip Oriyano
- 177字
- 2021-07-02 12:38:33
Red team
The goals of the red team are quite different from the blue team. The red team focuses on continuously attacking the organization's systems and networks. You may be wondering why a team with such objectives would even exist. As mentioned earlier in Chapter 1, Introduction to Kali NetHunter, hackers are always trying gain to unauthorized access into another person’s or company’s systems for various reasons. However, unauthorized access into another system or network is illegal as it is intrusive. Organizations need to continue improving their security posture due to the growing threat landscape in the digital world.
The red team is either external contractors or an in-house team whose objective is to continuously simulate real-world cyberattacks. This is to ensure all vulnerabilities are discovered and to determine how each can be exploited by a real, malicious hacker. The red team are like the black hat hackers who are contracted by an organization to discover all hidden vulnerabilities, exploit any flaws, and provide a detailed report at the end of their testing.
- 數(shù)據(jù)恢復(fù)方法及案例分析
- 黑客大曝光:無線網(wǎng)絡(luò)安全(原書第3版)
- 工業(yè)物聯(lián)網(wǎng)安全
- 硬黑客:智能硬件生死之戰(zhàn)
- 學(xué)電腦安全與病毒防范
- Web安全之深度學(xué)習(xí)實戰(zhàn)
- 黑客攻防從入門到精通
- 信息技術(shù)基礎(chǔ):提高篇·實驗與習(xí)題
- 網(wǎng)絡(luò)安全實戰(zhàn)詳解(企業(yè)專供版)
- 交換機·路由器·防火墻(第2版)
- 網(wǎng)絡(luò)空間安全法律問題研究
- 網(wǎng)絡(luò)安全監(jiān)控實戰(zhàn):深入理解事件檢測與響應(yīng)
- 黑客攻防入門
- 動態(tài)賦能網(wǎng)絡(luò)空間防御
- 惡意軟件、Rootkit和僵尸網(wǎng)絡(luò)