The execution of offensive security assessment by red teams is the subject of most literature surrounding ethical hacking and its activities. There are countless walkthroughs and examples in many publications about how to hack into this system or that, using this tool or that. The focus on execution in this book, however, centers on discussing the professional methodology of leveraging such activities, not the activities themselves. Using the slickest exploits and coolest tools or scripts to compromise hosts in an organization is all for naught if done unprofessionally. Executing is ...
6. Executing
Get Professional Red Teaming: Conducting Successful Cybersecurity Engagements now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.