Red Team Fundamentals

  1. Image Upload 2
    Adversarial Perspective
  2. Image Upload 4
    Evil
  3. Image Upload 6
    Ground Truth About System
  4. Image Upload 8
    Non-Technical Knowledge
  5. Image Upload 10
    People Skills
  6. Image Upload 12
    System Context
  7. Image Upload 14
    Technical Knowledge
  8. Image Upload 16
    Tactics, Techniques, and Procedures (TTPs)
  9. Image Upload 18
    Ultimate Red Team Pwnage
  10. The Red Team Definition
    It is authorized, adversaty-based, assessments perofrmed for defensive purposes.
  11. Definition of Graves Law
    Never trust the Hardware
  12. Generic Threat Profile
    Name all three columns under commitment
    • Intensity
    • Stealth
    • Time
  13. Generic Threat Profile
    Name all four columns under Resources
    • Technical Personnel
    • Cyber
    • Kinetic
    • Access
  14. The 6 steps of the IDART Methodology
    • 1. Plan
    • 2. Collect Data
    • 3. Characterize
    • 4. Analyze
    • 5. Report
    • Optional. Engage
  15. How many rows in the Generic Threat Matrix?
    8
  16. What document must you have before starting ANY red team activites?
    Rules of Engagement (ROE)
Author
techno_cricket
ID
364909
Card Set
Red Team Fundamentals
Description
Updated