- Hands-On Red Team Tactics
- Himanshu Sharma Harpreet Singh
- 100字
- 2021-08-13 15:36:36
Methodology
Red-teaming is based on the PTES standard as the foundation. However, there's much more to it. It can be said that the penetration testing activity is performed with the aim of finding as many vulnerabilities in the given amount of time as possible. However, red-teaming is performed with only one goal and by staying discreet.
The methodology used in a red-team activity involves the following:
- Reconnaissance
- Compromise
- Persistence
- Command and control
- Privilege escalation
- Pivoting
- Reporting and cleanup
The following cycle basically repeats for every new piece of information that is found about the client until the goal is met:
推薦閱讀
- 網(wǎng)絡(luò)工程設(shè)計與安裝
- HBase不睡覺書
- Solaris 10系統(tǒng)管理
- Firebase Cookbook
- 網(wǎng)頁設(shè)計與制作項目教程(HTML+CSS+Bootstrap)
- 電子商務(wù)信息系統(tǒng)開發(fā)建設(shè)
- 物聯(lián)網(wǎng)及其安全技術(shù)解析
- 十進制網(wǎng)絡(luò)技術(shù)及應(yīng)用
- 軟件定義網(wǎng)絡(luò)核心原理與應(yīng)用實踐
- 深入淺出ASP.NET Core
- 全球網(wǎng)絡(luò)身份管理的現(xiàn)狀與發(fā)展
- 信息安全技術(shù)
- 兼攻之道:思科當(dāng)前贏利和長遠發(fā)展的秘訣
- 計算機網(wǎng)絡(luò)實驗教程
- Axure RP 8.0中文版原型設(shè)計從入門到精通