官术网_书友最值得收藏!

  • Hands-On Red Team Tactics
  • Himanshu Sharma Harpreet Singh
  • 100字
  • 2021-08-13 15:36:36

Methodology

Red-teaming is based on the PTES standard as the foundation. However, there's much more to it. It can be said that the penetration testing activity is performed with the aim of finding as many vulnerabilities in the given amount of time as possible. However, red-teaming is performed with only one goal and by staying discreet.

The methodology used in a red-team activity involves the following:

  • Reconnaissance
  • Compromise
  • Persistence
  • Command and control
  • Privilege escalation
  • Pivoting
  • Reporting and cleanup

The following cycle basically repeats for every new piece of information that is found about the client until the goal is met:

主站蜘蛛池模板: 隆子县| 宜昌市| 望城县| 天水市| 翁牛特旗| 仁化县| 南华县| 楚雄市| 阳东县| 将乐县| 德化县| 民丰县| 伽师县| 新邵县| 武安市| 杂多县| 长沙市| 杨浦区| 外汇| 三台县| 博乐市| 丹东市| 博爱县| 新和县| 岢岚县| 靖安县| 巩义市| 贵南县| 城市| 长武县| 红桥区| 兴化市| 内乡县| 耒阳市| 麻城市| 阳江市| 随州市| 辽阳市| 冀州市| 呼图壁县| 无极县|