Chapter 16: Red Team/Blue Team Exercises
It's time to have some fun with hacking tools and attack strategies, as in this chapter, we will be discussing Red Team/Blue Team exercises and we will get to perform some of the activities ourselves. By the end of this chapter, you will be more familiar with the common Tactics, Techniques, and Procedures (TTPs) used by Red Team members, based on real-world attack equivalents.
We will cover the following topics throughout this chapter:
- Red Team versus Blue Team versus pentesting
- Red Team/Blue Team example exercise, attacking Company Z
Red Team versus Blue Team versus pentesting
We briefly discussed the difference between a Red Team exercise and pentesting in Chapter 14, Different Types of Cybersecurity ...
Get Industrial Cybersecurity - Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.