Introduction to Red Team Operations

by Sunny Neo, Centurion Information Security

This talk provides an overview of the differences between penetration testing and red teaming, along with the challenges faced when up against threat hunters and endpoint detection and response solutions. This includes avoiding detection by protecting and encrypting C2 network traffic and modifying the default settings and behaviors of common tools to avoid leaving behind obvious artifacts on the compromised host.

Infosec in the City. Copyright © 2017-2019
IIC Productions (Pte. Ltd.). All rights reserved.

  • @infoseccity
  • @infosec_city

Contact Us  |  Join Our Mailing List   |  Follow Us :