Penetration Testing / Red Team / Adversary Simulation
Penetration Testing / Red Team / Adversary Simulation
- Penetration Testing (Pen Test): Authorized cyberattack to identify security weaknesses in systems, networks, or applications.
- Scope-Limited & Goal-Oriented: Focused on specific assets; aims to find exploitable vulnerabilities before attackers do.
- Types of Pen Tests:
- External: Targets public-facing assets.
- Internal: Simulates insider attacks.
- Web App: Tests applications, APIs, databases.
- Wireless: Checks Wi-Fi networks.
- Deliverables: Detailed report with findings, risk levels, and remediation recommendations.
- Purpose: Identify and fix vulnerabilities proactively.
- Red Teaming: Full-scope, realistic simulation testing people, processes, and technology.
- Scope-Wide & Objective: Covers digital, physical, and social engineering; measures detection and response capabilities.
- Method: Uses stealth, persistence, and multiple attack vectors; delivers after-action report highlighting failed controls.
- Adversary Simulation (Purple Team): Red Team attacks; Blue Team defends to identify SOC gaps and improve response.
- Purpose: Continuously test SOC rules, realistic TTPs, and frameworks like MITRE ATT&CK to strengthen detection, response, and security posture.