Red Team or Penetration Approach

In Any Cyber engagement whether it’s a legal Red teaming maneuver or a black hat crime like exploiting unauthorized devices, fraud, or scams.

Cyb0rgBytes
1 min readDec 25, 2022
  1. The First engagement is a phase which is called reconnaissance or information gathering, in this phase the attacker or red teamer scans and gets information about the target.
  2. The Second phase of the engagement is vulnerability scanning, in this phase, the attacker gets info and looks for flaws that could later be exploited.
  3. The Third phase is gaining access, in this step or phase, the attacker exploits the device using a specific flaw or bug in the system.
  4. The Fourth Phase is called maintaining access, in this phase, the attacker should find a way to keep his access maintained and persistent.
  5. The Fifth phase is called elevating privilege or Privilege escalation, which means gaining full access to the system.
  6. The Sixth phase is reporting and evaluation reports to present to the audience or customer.

Thanks for Reading, Stay tuned for more!

--

--

Cyb0rgBytes
Cyb0rgBytes

Written by Cyb0rgBytes

A Passionate and Defensive Type of Ethical Hacker , booted and ready to secure the world

No responses yet