logo
logo
Sign in

Red and Blue Teaming by Hacken

avatar
Hub Hacken
Red and Blue Teaming by Hacken

The Red teaming term came from the military field and means a friendly attacking team, which evaluates the defense of digital infrastructure. It is performed by white hat hackers imitating the possible actions of malefactors. Such companies as Microsoft, IBM, and SAIC together with some governmental institutions perform regular red teaming in order to ensure that their data is safe.

How red team pentesting occurs

Firstly, red team is focused on collecting information about the target. Generally, they use conventional public tools such as social media networks (Google, LinkedIn, Facebook, etc.). As a result, much can be learned from the open sources. Based on this information the tool for further engagement is built. Then, active stage of the operation (red team penetration testing) takes place. The intent is to simulate a real-world attack, using both commercial and self-developed tools. Report and remediation action plan are the main deliverables which are helping to close the security gaps.

Source

collect
0
avatar
Hub Hacken
guide
Zupyak is the world’s largest content marketing community, with over 400 000 members and 3 million articles. Explore and get your content discovered.
Read more