Red Team or Penetration Approach
In Any Cyber engagement whether it’s a legal Red teaming maneuver or a black hat crime like exploiting unauthorized devices, fraud, or scams.
1 min readDec 25, 2022
- The First engagement is a phase which is called reconnaissance or information gathering, in this phase the attacker or red teamer scans and gets information about the target.
- The Second phase of the engagement is vulnerability scanning, in this phase, the attacker gets info and looks for flaws that could later be exploited.
- The Third phase is gaining access, in this step or phase, the attacker exploits the device using a specific flaw or bug in the system.
- The Fourth Phase is called maintaining access, in this phase, the attacker should find a way to keep his access maintained and persistent.
- The Fifth phase is called elevating privilege or Privilege escalation, which means gaining full access to the system.
- The Sixth phase is reporting and evaluation reports to present to the audience or customer.
Thanks for Reading, Stay tuned for more!