<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Red Teaming on System Overlord</title><link>https://systemoverlord.com/tags/red-teaming.html</link><description>Recent content in Red Teaming on System Overlord</description><generator>Hugo</generator><language>en-us</language><managingEditor>david@systemoverlord.com (David Tomaschik)</managingEditor><webMaster>david@systemoverlord.com (David Tomaschik)</webMaster><lastBuildDate>Tue, 26 Mar 2019 00:00:00 +0000</lastBuildDate><atom:link href="https://systemoverlord.com/tags/red-teaming/index.xml" rel="self" type="application/rss+xml"/><item><title>So You Want to Red Team?</title><link>https://systemoverlord.com/2019/03/26/so-you-want-to-red-team.html</link><pubDate>Tue, 26 Mar 2019 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2019/03/26/so-you-want-to-red-team.html</guid><description>&lt;p&gt;So there&amp;rsquo;s a lot of confusion out there about Penetration Testing and Red
Teaming. I wanted to put together a list of resources for those familiar with
infosec or penetration testing who want to get into red teaming or at least get
a better understanding of the methodologies and techniques used by red teamers.&lt;/p&gt;
&lt;p&gt;First, it&amp;rsquo;s important to note that Red Teaming is predominantly comprised of two
things: alternative analysis and adversary simulation. Red teams do not attempt
to find &amp;ldquo;all the vulnerabilities&amp;rdquo; and do not usually try to have a wide breadth
of coverage. Instead, red teams seek to simulate an adversary with a particular
objective, predominantly to act as a &amp;ldquo;sparring partner&amp;rdquo; for blue teams. Keep in
mind, red teams are the only adversary that will debrief with the blue team so
that blue team can figure out what they missed or could have done differently.&lt;/p&gt;
&lt;p&gt;For more about the specific definition of Red Teaming, check out the
presentation &lt;a href="https://www.slideshare.net/TobyKohlenberg/red-teaming-probably-isnt-for-you-81283357"&gt;Red Teaming Probably Isn&amp;rsquo;t For You&lt;/a&gt;
by fellow red teamer Toby Kohlenberg.&lt;/p&gt;</description></item><item><title>Getting Started in Offensive Security</title><link>https://systemoverlord.com/2017/09/18/getting-started-in-offensive-security.html</link><pubDate>Mon, 18 Sep 2017 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2017/09/18/getting-started-in-offensive-security.html</guid><description>&lt;p&gt;&lt;strong&gt;Please note that this post, like all of those on my blog, represents only my
views, and not those of my employer. Nothing in here implies official hiring
policy or requirements.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;I&amp;rsquo;m not going to pretend that this article is unique or has magic bullets to get
you into the offensive security space. I also won&amp;rsquo;t pretend to speak for others
in that space or in other areas of information security. It&amp;rsquo;s a big field, and
it turns out that a lot of us have opinions about it. Mubix maintains a
&lt;a href="https://gist.github.com/mubix/5737a066c8845d25721ec4bf3139fd31"&gt;list of posts like this&lt;/a&gt;
so you can see everyone&amp;rsquo;s opinions. I highly recommend the post &lt;a href="https://medium.freecodecamp.org/so-you-want-to-work-in-security-bc6c10157d23"&gt;&amp;ldquo;So You Want
to Work in Security&amp;rdquo;&lt;/a&gt;
by Parisa Tabriz for a view that&amp;rsquo;s not specific to offensive security. (Though
there&amp;rsquo;s a lot of cross-over.)&lt;/p&gt;</description></item></channel></rss>