September 2018
Intermediate to advanced
480 pages
9h 45m
English
Red-teaming is based on the PTES standard as the foundation. However, there's much more to it. It can be said that the penetration testing activity is performed with the aim of finding as many vulnerabilities in the given amount of time as possible. However, red-teaming is performed with only one goal and by staying discreet.
The methodology used in a red-team activity involves the following:
The following cycle basically repeats for every new piece of information that is found about the client until the goal is met: