CHAPTER 6
Red and Purple Teams
In this chapter, we cover the following topics:
• Introduction to red teams
• Components of a red team
• Threat simulation
• Making money with red teaming
• Purple teams
Although we covered what an ethical hacker is in Chapter 1, it’s important to understand what the role of an ethical hacker is in the context of the security ecosystem. For both corporate security and consulting, ethical hackers help provide an adversarial mindset to security to help organizations understand what an attacker would see, what they could do, and what the impact would be. This helps organizations grow both tactically, by fixing specific issues, and strategically, by changing the way they operate and do business.
Introduction ...
Get Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition, 6th Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.