Knowledge

Red team

Source πŸ“

907: 806: 674: 722: 461: 88:
excessive damage during their exercises. Physical red teaming will often involve a reconnaissance phase where information is gathered and weaknesses in security are identified, and then that information will be used to conduct an operation (typically at night) to gain physical entry to the premises. Security devices will be identified and defeated using tools and techniques. Physical red teamers will be given specific objectives such as gaining access to a server room and taking a portable hard drive, or gaining access to an executive's office and taking confidential documents.
935: 331: 622:(OSINT) gathering can occur by researching locations and staff members via the Internet, including the company's website, social media accounts, search engines, mapping websites, and job postings (which give hints about the technology and software the company uses). It is a good practice to do multiple days of reconnaissance, to reconnoiter both during the day and at night, to bring at least three operators, to utilize a nearby staging area that is out of sight of the target, and to do reconnaissance and infiltration as two separate trips rather than combining them. 521: 599: 903:. In this document, Amos discussed how the concept of the red team needs to challenge the process of planning and making decisions by applying critical thinking from the tactical to strategic level. In June 2013, the Marine Corps staffed the red team billets outlined in the draft white paper. In the Marine Corps, all Marines designated to fill red team positions complete either six-week or nine-week red team training courses provided by the University of Foreign Military and Cultural Studies (UFMCS). 626:
pretending to be on the phone. In the event of compromise, such as employees becoming suspicious, a story can be rehearsed ahead of time until it can be recited confidently. If the team has split up, the compromise of one operator can result in the team leader pulling the other operators out. Concealed video cameras can be used to capture footage for later review, and debriefs can be done quickly after leaving the area so that fresh information is quickly documented.
536:(KPIs) can help to make sure a red team is achieving the desired output. Examples of red team KPIs include performing a certain number of penetration tests per year, or by growing the team by a certain number of pen testers within a certain time period. It can also be useful to track the number of compromised machines, compromisable machines, and other metrics related to infiltration. These statistics can be graphed by day and placed on a dashboard displayed in the 764:(SITREPs) to the team leader when unusual things happen. The team leader can then decide if the operation should continue, should be aborted, or if a team member should surrender by showing their authorization letter and ID. When confronted by civilians such as employees, red team operators can attempt social engineering. When confronted by law enforcement, it is good practice to immediately surrender due to the potential legal and safety consequences. 327:(GDPR) fines. Any of these threats can be red teamed, in order to explore how severe the issue is. Tabletop exercises, where intrusions are acted out over a tabletop similar to how one would play a board game, can be used to simulate intrusions that are too expensive, too complicated, or illegal to execute live. It can be useful to attempt intrusions against the red team and the blue team, in addition to more traditional targets. 284:
rate. Purple teams may engage in "threat hunting" sessions, where both the red team and the blue team look for real intruders. Involving other employees in the purple team is also beneficial, for example software engineers who can help with logging and software alerts, and managers who can help identify the most financially damaging scenarios. One danger of purple teaming is complacence and the development of
962:, which suffered a terrorist attack in 1988. Red teams conduct tests at about 100 US airports annually. Tests were on hiatus after the September 11 attacks in 2001, and resumed in 2003 under the Transportation Security Administration, who assumed the FAA's aviation security role after 9/11. Before the September 11 attacks, FAA use of red teaming revealed severe weaknesses in security at 52:
legal, but can surprise some employees who may not know that red teaming is occurring, or who may be deceived by the red team. Some definitions of red team are broader, and include any group within an organization that is directed to think outside the box and look at alternative scenarios that are considered less plausible. This can be an important defense against false assumptions and
610:
team reconnaissance equipment might include military clothing since it does not rip easily, red lights to preserve night vision and be less detectable, radios and earpieces, camera and tripod, binoculars, night vision equipment, and an all-weather notebook. Some methods of field communication include a Bluetooth earpiece dialed into a cell phone conference call during the day, and
590:
contact information. The rules of engagement may be updated after the reconnaissance phase, with another round of back and forth between the red team and the client. The data gathered during the reconnaissance phase can be used to create an operational plan, both for internal use, and to send to the client for approval.
756:
Passwords are often located under keyboards. Techniques can be used to avoid disturbing the placement of objects in offices such as keyboards and chairs, as adjusting these will often be noticed. Lights and locks can be left in their original state of on or off, locked or unlocked. Steps can be taken
456:
During a real intrusion, the red team can be repurposed to work with the blue team to help with defense. Specifically, they can provide analysis of what the intruders will likely try to do next. During an intrusion, both the red team and the blue team have a home-field advantage because they are more
173:
Red teams are sometimes associated with "contrarian thinking" and fighting groupthink, the tendency of groups to make and keep assumptions even in the face of evidence to the contrary. One example of a group that was not called a red team, but that arguably was one of the earliest examples of forming
307:
When infiltrating, there is a stealthy "surgical" approach that stays under the radar of the blue team and requires a clear objective, and a noisy "carpet bombing" approach that is more like a brute force attack. Carpet bombing is often the more useful approach for red teams, because it can discover
283:
is the temporary combination of both teams and can provide rapid information responses during a test. One advantage of purple teaming is that the red team can launch certain attacks repeatedly, and the blue team can use that to set up detection software, calibrate it, and steadily increase detection
178:
in 1973. The attack against Israel nearly took Israel by surprise despite ample evidence of an impending attack, and almost resulted in Israel's defeat. Ipcha Mistabra was formed after the war, and given the duty of always presenting a contrarian, unexpected, or unorthodox analysis of foreign policy
218:
Over time, the practice of red teaming expanded to other industries and organizations, including corporations, government agencies, and non-profit organizations. The approach has become increasingly popular in the world of cybersecurity, where red teams are used to simulate real-world attacks on an
51:
is a group that pretends to be an enemy, attempts a physical or digital intrusion against an organization at the direction of that organization, then reports back so that the organization can improve their defenses. Red teams work for the organization or are hired by the organization. Their work is
660:
Sometimes there are security changes between reconnaissance and infiltration, so it is a good practice for teams that are approaching a target to "assess and acclimate", to see if any new security measures can be seen. Compromises during infiltration are most likely to occur during the approach to
589:
Having a "rules of engagement" document that is shared with the client is helpful, to specify which TTPs will be used, what locations may be targeted, what may not be targeted, how much damage to equipment such as locks and doors is permitted, what the plan is, what the milestones are, and sharing
647:
vests and small tactical bags can provide useful places to store tools, but has the downsides of being conspicuous and increasing encumbrance. Black clothing or dark camouflage can be helpful in rural areas, whereas street clothes in shades of gray and black may be preferred in urban areas. Other
625:
Recon teams can use techniques to conceal themselves and equipment. For example, a passenger van can be rented and the windows can be blacked out to conceal photography and videography of the target. Examining and videoing the locks of a building during a walk-around can be concealed by the recon
609:
Part of physical red teaming is performing reconnaissance. The type of reconnaissance gathered usually includes information about people, places, security devices, and weather. Reconnaissance has a military origin, and military reconnaissance techniques are applicable to physical red teaming. Red
500:
to help track the location of intruders. These honeypots can help alert the blue team to a network intrusion that might otherwise have gone undetected. Various software can be used to set up a honeypot file depending on the operating system: macOS tools include OpenBMS, Linux tools include auditd
772:
The ideal way to exit a facility is slowly and carefully, similar to how entry was achieved. There is sometimes an urge to rush out after achieving a mission goal, but this is not good practice. Exiting slowly and carefully maintains situational awareness, in case a previously empty area now has
634:
Most physical red team operations occur at night, due to reduced security of the facility and so that darkness can conceal activities. An ideal infiltration is usually invisible both outside the facility (the approach is not detected by bystanders or security devices) and inside the facility (no
741:
Commercial buildings will often have some lights left on. It is good practice to not turn lights on or off, as this may alert someone. Instead, utilizing already unlit areas is preferred for red team operations, with rushing and freezing techniques to be used to quickly move through illuminated
708:
that targets the frequencies that alarms use for their internal and external communications. Motion sensors can be defeated with a special body-sized shield that blocks a person's heat signature. Ground sensors are prone to false positives, which can lead security personnel to not trust them or
480:
An organization's red team may be an attractive target for real attackers. Red team member's machines may contain sensitive information about the organization. In response, red team member's machines are often secured. Techniques for securing machines include configuring the operating system's
87:
Physical red teaming focuses on sending a team to gain entry to restricted areas. This is done to test and optimize physical security such as fences, cameras, alarms, locks, and employee behavior. As with technical red teaming, rules of engagement are used to ensure that red teams do not cause
71:
employees who are responsible for defending an organization's networks and computers against attack. In technical red teaming, attack vectors are used to gain access, and then reconnaissance is performed to discover more devices to potentially compromise. Credential hunting involves scouring a
664:
Proper movement can help a red team avoid being spotted while approaching a target, and may include rushing, crawling, avoiding silhouetting when on hills, walking in formations such as single file, and walking in short bursts then pausing. The use of hand signals may be used to reduce noise.
861:(OPFOR) in a simulated conflict may be referred to as a Red Cell. The key theme is that the adversary (red team) leverages tactics, techniques, and equipment as appropriate to emulate the desired actor. The red team challenges operational planning by playing the role of a mindful adversary. 501:
plugins, and Windows tools include System Access Control Lists (SACL). Notifications can include popups, emails, and writing to a log file. Centralized monitoring, where important log files are quickly sent to logging software on a different machine, is a useful network defense technique.
700:
are common at businesses, and covert RFID readers combined with social engineering during reconnaissance can be used to duplicate an authorized employee's badge. Barbed wire on fences can be bypassed by placing a thick blanket over it. Anti-climb fences can be bypassed with ladders.
829:
in 2011, including red teams from outside the Central Intelligence Agency, because there were major diplomatic and public relations consequences for launching a military operation into Pakistan, so it was important to double-check the original team's intelligence and conclusions.
717:
Once inside, if there is suspicion that the building is occupied, disguising oneself as a cleaner or employee using the appropriate clothing is a good tactic. Noise discipline is often important once inside a building, as there are less ambient sounds to mask red team noises.
974:
The United States Transportation Security Administration has used red teaming in the past. In one red team operation, undercover agents were able to fool Transportation Security Officers and bring weapons and fake explosives through security 67 out of 70 times in 2015.
737:
or an executive's office. However, it can be difficult to figure out a room's location in advance, so this is often figured out on the fly. Reading emergency exit route signs and the use of a watch with a compass can assist with navigating inside of buildings.
656:
Light discipline (keeping lights from vehicles, flashlights, and other tools to a minimum) reduces the chance of compromise. Some tactics of light discipline include using red flashlights, using only one vehicle, and keeping the vehicle's headlights off.
346:, which is software that visually plots nodes, relationships, and properties. Typical nodes might be computers, users, or permission groups. Red teams will usually have very good graph databases of their own organization, because they can utilize 385:. The red team gets access to a computer, looks for credentials that can be used to access a different computer, then this is repeated, with the goal of accessing many computers. Credentials can be stolen from many locations, including files, 825:. Alternative analysis involves bringing in fresh analysts to double-check the conclusions of another team, to challenge assumptions and make sure nothing was overlooked. Three red teams were used to review the intelligence that led to the 182:
In the early 2000s, there are examples of red teams being used for tabletop exercises. A tabletop exercise is often used by first responders and involves acting out and planning for worst case scenarios, similar to playing a tabletop
879:
recommended them to help prevent the shortcomings that led to the September 11 attacks. The U.S. Army created the Army Directed Studies Office in 2004. This was the first service-level red team, and until 2011 was the largest in the
966:
in Boston, where two of the four hijacked 9/11 flights originated. Some former FAA investigators who participated on these teams feel that the FAA deliberately ignored the results of the tests, and that this resulted in part in the
614:
with earpieces at night. In case of compromise, red team members often carry identification and an authorization letter with multiple after-hours contacts who can vouch for the legality and legitimacy of the red team's activities.
303:
The initial entry point of a red team or an adversary is called the beachhead. A mature blue team is often adept at finding the beachhead and evicting attackers. A role of the red team is to increase the skills of the blue team.
274:, and an element of surprise. The blue team is given no advance warning of a red team, and will treat it as a real intrusion. One role of a permanent, in-house red team is to improve the security culture of the organization. 752:
Once the target room has been reached, if something needs to be found such as a specific document or specific equipment, the room can be divided into sections, with each red team member focusing on a section.
586:. In physical red teaming, computer networks are not usually the target. Unlike cybersecurity, which typically has many layers of security, there may only be one or two layers of physical security present. 2464: 574:
or physical penetration testing involves testing the physical security of a facility, including the security practices of its employees and security equipment. Examples of security equipment include
517:(SOP) can ensure that the proper people are notified and involved in planning, and improve the red team process, making it mature and repeatable. Red team activities typically have a regular rhythm. 76:, and once these are found, can be used to compromise additional computers. During intrusions from third parties, a red team may team up with the blue team to assist in defending the organization. 295:
is a group that oversees and manages operations between red teams and blue teams. For example, this may be a company's managers that determine the rules of engagement for the red team.
358:
can be used to create and modify graph databases. Any type of administrator account is valuable to place in the graph database, including administrators of third party tools such as
906: 166:, who assembled a red team and a blue team to explore which government contractor should be awarded an experimental aircraft contract. Another early example modeled negotiating an 661:
the facility. Employees, security, police, and bystanders are the most likely compromise a physical red team. Bystanders are rarer in rural areas, but also much more suspicious.
648:
urban disguise items include a laptop bag, or a pair of headphones around the neck. Various types of shoe coverings can be used to minimize footprints both outdoors and indoors.
776:
The goal of all team members is to reach the rally point, or possibly a second emergency rally point. The rally point is usually at a different location than the dropoff point.
889: 543:
In order to identify worst offenders, compromises can be graphed and grouped by where in the software they were discovered, company office location, job title, or department.
2595: 892:(CGSC) or equivalent intermediate and senior level schools. Courses include topics such as critical thinking, groupthink mitigation, cultural empathy, and self-reflection. 605:
and earpieces are sometimes used by physical red teams conducting operations at night. Something less conspicuous such as Bluetooth earbuds may be preferred during the day.
263:("pen testers") attempting to break into a computer system, with no element of surprise. The organization is aware of the penetration test and is ready to mount a defense. 688:
Common security devices include doors, locks, fences, alarms, motion sensors, and ground sensors. Doors and locks are often faster and quieter to bypass with tools and
729:
can be an alluring target for red teams. Physical access to a server can help gain entry into secured networks that are otherwise well-protected from digital threats.
2065: 1270: 680:
is regarded by some physical red teams as an inferior method of bypassing locks, due to the noise and time it takes compared to using lower skill attacks such as
989: 2003: 338:. For red teams, this software can be used to create a map of an infiltrated network. Nodes (the circles) are commonly computers, users, or permission groups. 436:
applications. Useful tasks might include sending emails, searching documents, encrypting, or retrieving data. Red teams can take control of a browser using
884:(DoD). The University of Foreign Military and Cultural Studies provides courses for red team members and leaders. Most resident courses are conducted at 2473: 938:
Red teams are used by some airport security organizations such as the United States Transportation Security Administration to test the accuracy of
2693: 132: 2167: 757:
to ensure that equipment is not left behind, such as having a list of all equipment brought in and checking that all items are accounted for.
2673: 2497: 2450: 2431: 2123: 513:
can help to delineate which systems are off-limits, prevent security incidents, and ensure that employee privacy is respected. The use of a
2287: 1274: 2024: 1150: 881: 556: 320: 124: 773:
someone in it or approaching it. While the entrance path is normally taken during exit, a closer or alternative exit can also be used.
2460: 865: 842: 324: 160: 643:
The use of a load out list can help ensure that important red team equipment is not forgotten. The use of military equipment such as
563:(APTs), can be consulted to see how many TTPs a red team is exploiting, and give additional ideas for TTPs to utilize in the future. 2412: 742:
areas. Standing full-height in front of windows and entering buildings via lobbies is often avoided due to the risks of being seen.
350:, including working with the blue team to create a thorough map of the network, and a thorough list of users and administrators. A 143:
The concept of red teaming and blue teaming emerged in the early 1960s. One early example of red teaming involved the think tank
2076: 947: 923: 128: 911: 174:
a group to fight groupthink, is the Israeli Ipcha Mistabra that was formed after Israeli decision-making failures during the
2628: 547:
can be used to identify which intrusion scenarios are most likely, most damaging, or both. A Test Maturity Model, a type of
2659:
Second public hearing of the National Commission on Terrorist Attacks Upon the United States: Statement of Bogdan Dzakovic
402: 271: 260: 64: 311:
There are a variety of cybersecurity threats. Threats may range from something traditional such as hacking the network's
2609: 2574: 918:
The DoD uses cyber red teams to conduct adversarial assessments on their networks. These red teams are certified by the
514: 81: 2688: 1004: 963: 733:
Red teams usually have goal locations selected and tasks pre-planned for each team or team member, such as entering a
192: 789:
Private companies sometimes use red teams to supplement their normal security procedures and personnel. For example,
401:
and pass the hash can be used to get access to websites and machines without entering a password. Techniques such as
2370: 1019: 968: 872: 826: 814: 560: 537: 525: 120: 797:
utilize red teams to help secure their systems. Some financial institutions in Europe use the TIBER-EU framework.
2348: 1044: 635:
damage is done and nothing is bumped or left out of place), and does not alert anyone that a red team was there.
548: 39: 721: 2180: 919: 619: 386: 112: 2050: 159:, and "blue team" and the color blue were used to represent the United States. Another early example involved 2248: 1209: 2340: 1049: 544: 378: 355: 342:
Once access to a network is achieved, reconnaissance can be conducted. The data gathered can be placed in a
2674:
GAO Red Team reveals Nuclear material can easily be smuggled into the United States years after 911 attack
895:
The Marine Corps red team concept commenced in 2010 when the Commandant of the Marine Corps (CMC) General
853:
Militaries typically uses red teaming for alternative analysis, simulations, and vulnerability probes. In
425: 421: 148: 2658: 2110: 876: 834: 533: 316: 749:
can be used to peer around corners and under doors, to help spot people, cameras, or motion detectors.
2175: 999: 497: 482: 465: 417: 347: 188: 2209: 63:
Technical red teaming focuses on compromising networks and computers digitally. There may also be a
2184: 854: 510: 445: 359: 167: 108: 77: 219:
organization's digital infrastructure and test the effectiveness of their cybersecurity measures.
2223: 288:, which can be combatted by hiring people with different skillsets or hiring an external vendor. 212: 200: 116: 2294: 673: 2493: 2446: 2427: 2408: 2119: 994: 951: 939: 813:'s compound in Pakistan. Three red teams were used to review the intelligence that led to the 598: 437: 429: 398: 330: 312: 250: 231: 179:
and intelligence reports, so that things would be less likely to be overlooked going forward.
92: 2516: 84:
are often utilized to ensure that the red team does not cause damage during their exercises.
885: 805: 761: 689: 681: 575: 473: 433: 406: 362:(AWS). Data can sometimes be exported from tools and then inserted into the graph database. 255: 144: 96: 73: 1122: 934: 493:
access, improving logging and alerts, securely deleting files, and encrypting hard drives.
2555: 1184: 985: 810: 394: 365:
Once the red team has compromised a computer, website, or system, a powerful technique is
163: 100: 2536:"Defense Science Board – Task Force on the Role and Status of DoD Red Teaming Activities" 552: 551:, can be used to assess how mature a red team is, and what the next step is to grow. The 424:(CLI) scripts to automate some of their tasks. For example, CLI scripts can utilize the 2661:(Report). National Commission on Terrorist Attacks Upon the United States. May 22, 2003 2404: 858: 611: 351: 343: 335: 175: 520: 2682: 896: 602: 441: 68: 2535: 2401:
Red Teaming: How Your Business Can Conquer the Competition by Challenging Everything
1039: 1024: 841:("on the contrary") to re-examine discarded assumptions and avoid complacency. The 705: 693: 677: 579: 486: 382: 156: 496:
One tactic is to engage in "active defense", which involves setting up decoys and
234:
of an organization by attempting to infiltrate their computer networks digitally.
2639: 1265: 2489: 2325: 734: 726: 1034: 1014: 374: 366: 285: 184: 53: 35: 2320: 2025:"Google's hackers: Inside the cybersecurity red team that keeps Google safe" 955: 790: 746: 697: 540:(SOC) to provide motivation to the blue team to detect and close breaches. 490: 204: 468:(pictured) can be used to limit access to a private network from the wider 17: 1009: 959: 469: 457:
familiar with the organization's networks and systems than the intruder.
410: 370: 208: 196: 152: 104: 2371:"Red Team agents use disguises, ingenuity to expose TSA vulnerabilities" 1029: 2582:(Ninth ed.). University of Foreign Military and Cultural Studies 794: 460: 821:
When applied to intelligence work, red teaming is sometimes called
2576:
The Red Team Handbook: The Army's Guide to Making Better Decisions
933: 905: 804: 720: 672: 644: 583: 519: 472:. A software firewall, such as a firewall built into a computer's 459: 329: 2341:"National Commission on Terrorist Attacks Upon the United States" 1151:"Penetration Testing Versus Red Teaming: Clearing the Confusion" 2273:
Amos, James F. (March 2011). "Red Teaming in the Marine Corps".
1210:"What is Purple Teaming? How Can it Strengthen Your Security?" 899:
attempted to implement it. Amos drafted a white paper titled,
390: 31: 2224:"University of Foreign Military and Cultural Studies Courses" 2638:. U.S. Department of Defense. September 2003. Archived from 155:. "Red team" and the color red were used to represent the 30:
For the CPU and GPU company nicknamed "the red team", see
397:, and tracing and logging software. Techniques such as 72:
computer for credentials such as passwords and session
2603:(Third ed.). U.K. Ministry of Defence. June 2023. 2288:"Chairman of the Joint Chiefs of Staff Manual 5610.03" 476:, can be used to limit remote access to that computer. 444:'s remote debugging feature, or the testing framework 246:
is a group in charge of defending against intrusions.
833:
After failures to anticipate the Yom Kippur War, the
1185:"The Difference Between Red, Blue, and Purple Teams" 837:' Intelligence Directorate formed a red team called 270:
goes a step further, and adds physical penetration,
199:, and red teams were used for modeling responses to 2629:"The Role and Status of DoD Red Teaming Activities" 2486:
Red Team: How to Succeed By Thinking Like the Enemy
34:. For a focused team of technical specialists, see 369:hunting. These can be in the form of clear text 315:, or something less orthodox such as setting up 91:Red teams are used in several fields, including 1271:National Institute of Standards and Technology 60:originated in the 1960s in the United States. 990:Veteran Intelligence Professionals for Sanity 8: 2541:. U.S. Department of Defense. September 2003 950:(FAA) has been implementing red teams since 2424:Cybersecurity Attacks – Red Team Strategies 2249:"Red Team: To Know Your Enemy and Yourself" 890:U.S. Army Command and General Staff College 704:Alarms can sometimes be neutralized with a 319:, or providing too much employee access to 2466:DCDC Guidance Note: A Guide to Red Teaming 2554:Mulvaney, Brendan S. (November 1, 2012). 2147:United Kingdom Ministry of Defence, p. 67 2066:"Red Teaming: A Short Introduction (1.0)" 2610:"Officers With PhDs Advising War Effort" 2282: 2280: 2156:United Kingdom Ministry of Defence, p. 6 2049:European Central Bank (March 23, 2023). 2004:"Microsoft Enterprise Cloud Red Teaming" 597: 211:, red teaming became more common in the 1061: 618:Before physical reconnaissance occurs, 432:machines in order to automate tasks in 2321:"Test devices make it by DIA security" 2112:The NATO Alternative Analysis Handbook 845:(NATO) utilizes alternative analysis. 133:Transportation Security Administration 2608:Ricks, Thomas E. (February 5, 2007). 1692: 1690: 1688: 1233: 1231: 207:. In response to the failures of the 27:Group that provides security feedback 7: 2517:"Reflections from a Red Team Leader" 2168:"Strengthened Through the Challenge" 1275:United States Department of Commerce 1145: 1143: 1081: 1079: 1069: 1067: 1065: 409:, spoofing a credential prompt, and 323:(PII) which opens the company up to 2319:Sherman, Deborah (March 30, 2007). 557:tactics, techniques, and procedures 528:(SOC) at the University of Maryland 321:personally identifiable information 191:, with anti-terrorism in mind, the 2461:United Kingdom Ministry of Defence 2166:Mulvaney, Brendan S. (July 2012). 988:– FAA whistleblower and member of 875:much more frequently after a 2003 866:United Kingdom Ministry of Defence 843:North Atlantic Treaty Organization 325:General Data Protection Regulation 170:and evaluating its effectiveness. 161:United States Secretary of Defense 25: 2515:Craig, Susan (March–April 2007). 2636:Defense Science Board Task Force 532:Tracking certain metrics or key 147:, which did simulations for the 2369:Bennett, Brian (June 2, 2015). 969:9/11 terrorist attack on the US 948:Federal Aviation Administration 924:United States Strategic Command 901:Red Teaming in the Marine Corps 129:Federal Aviation Administration 1266:"White Team – Glossary | CSRC" 912:United States European Command 1: 2694:White hat (computer security) 2441:Talamantes, Jeremiah (2019). 2198:– via HQMC.Marines.mil. 910:Red team operatives during a 760:It is good practice to radio 403:optical character recognition 82:standard operating procedures 2443:Physical Red Team Operations 2253:Council on Foreign Relations 877:Defense Science Review Board 515:standard operating procedure 308:unexpected vulnerabilities. 115:, red teams are used by the 2556:"Don't Box in the Red Team" 2064:Mateski, Mark (June 2009). 1005:Exploit (computer security) 964:Logan International Airport 871:Red teams were used in the 785:Companies and organizations 561:advanced persistent threats 193:Central Intelligence Agency 2710: 2422:Rehberger, Johann (2020). 1020:Hacker (computer security) 873:United States Armed Forces 827:killing of Osama bin Laden 815:Killing of Osama bin Laden 538:security operations center 526:security operations center 29: 2349:University of North Texas 2210:"UFMCS Course Enrollment" 1045:Vulnerability (computing) 888:and target students from 549:Capability Maturity Model 416:The red team can utilize 2181:Marine Corps Association 920:National Security Agency 868:has a red team program. 620:open-source intelligence 387:source code repositories 113:United States government 2399:Hoffman, Bryce (2017). 2345:govinfo.library.unt.edu 1885:Talamantes, pp. 242–243 1786:Talamantes, pp. 183–185 1723:Talamantes, pp. 133–135 1673:Talamantes, pp. 100–101 1583:Talamantes, pp. 112–113 1050:Wireless identity theft 545:Monte Carlo simulations 2445:. Hexcode Publishing. 2118:(2nd ed.). 2017. 1123:"What is red teaming?" 943: 922:and accredited by the 915: 914:cyber warfare exercise 835:Israeli Defense Forces 818: 730: 685: 606: 534:performance indicators 529: 477: 426:Component Object Model 422:command-line interface 339: 149:United States military 38:. For other uses, see 2484:Zenko, Micah (2015). 2190:on September 28, 2013 1655:Talamantes, pp. 89–90 1646:Talamantes, pp. 72–73 1628:Talamantes, pp. 67–68 1610:Talamantes, pp. 58–63 1538:Talamantes, pp. 26–27 1529:Talamantes, pp. 24–25 1493:Rehberger, pp. 97–100 1155:Security Intelligence 937: 909: 882:Department of Defense 808: 801:Intelligence agencies 724: 676: 669:Entering the facility 601: 555:Navigator, a list of 523: 463: 333: 317:cryptocurrency mining 230:involves testing the 228:Technical red teaming 187:. In response to the 125:Department of Defense 109:intelligence agencies 2597:Red Teaming Handbook 2560:Armed Forces Journal 2479:on October 26, 2012. 2426:. Packt Publishing. 2176:Marine Corps Gazette 1484:Rehberger, pp. 93–94 1430:Rehberger, pp. 70–71 1295:Rehberger, pp. 40–41 1216:. September 14, 2021 1000:Eligible Receiver 97 823:alternative analysis 768:Exiting the facility 572:Physical red teaming 418:computer programming 348:home-field advantage 189:September 11 attacks 2300:on December 1, 2016 2082:on December 5, 2017 713:Inside the facility 511:rules of engagement 505:Managing a red team 360:Amazon Web Services 168:arms control treaty 78:Rules of engagement 2689:Military doctrines 2100:Zenko, pp. 127–128 2073:RedTeamJournal.com 1993:Talamantes, p. 274 1984:Talamantes, p. 273 1975:Talamantes, p. 272 1966:Talamantes, p. 267 1957:Talamantes, p. 266 1948:Talamantes, p. 296 1939:Talamantes, p. 286 1930:Talamantes, p. 284 1921:Talamantes, p. 253 1912:Talamantes, p. 249 1903:Talamantes, p. 246 1894:Talamantes, p. 247 1876:Talamantes, p. 182 1867:Talamantes, p. 238 1858:Talamantes, p. 199 1849:Talamantes, p. 208 1840:Talamantes, p. 213 1831:Talamantes, p. 201 1822:Talamantes, p. 202 1813:Talamantes, p. 231 1804:Talamantes, p. 215 1795:Talamantes, p. 186 1777:Talamantes, p. 169 1768:Talamantes, p. 173 1759:Talamantes, p. 160 1750:Talamantes, p. 153 1741:Talamantes, p. 287 1732:Talamantes, p. 131 1714:Talamantes, p. 137 1705:Talamantes, p. 136 1696:Talamantes, p. 126 1682:Talamantes, p. 102 1619:Talamantes, p. 142 1547:Talamantes, p. 153 946:The United States 944: 916: 855:military wargaming 819: 731: 686: 607: 567:Physical intrusion 530: 478: 413:can also be used. 405:(OCR), exploiting 340: 272:social engineering 213:United States Army 201:asymmetric warfare 2645:on April 19, 2009 2499:978-0-465-07395-5 2452:978-0-578-53840-2 2433:978-1-83882-886-8 2375:Los Angeles Times 2125:978-92-845-0208-0 2051:What is TIBER-EU? 1664:Talamantes, p. 98 1637:Talamantes, p. 83 1601:Talamantes, p. 79 1592:Talamantes, p. 51 1574:Talamantes, p 110 1565:Talamantes, p. 48 1556:Talamantes, p. 41 1520:Rehberger, p. 111 1511:Rehberger, p. 108 1502:Rehberger, p. 103 1448:Rehberger, p. 473 1439:Rehberger, p. 447 1421:Rehberger, p. 349 1403:Rehberger, p. 348 1394:Rehberger, p. 245 1385:Rehberger, p. 203 1376:Rehberger, p. 180 1367:Rehberger, p. 178 1358:Rehberger, p. 165 1349:Rehberger, p. 138 1340:Rehberger, p. 140 1331:Rehberger, p. 127 1322:Rehberger, p. 132 1313:Rehberger, p. 117 995:Black hat hacking 952:Pan Am Flight 103 940:airport screening 809:Terrorist leader 762:situation reports 559:(TTPs) including 438:Internet Explorer 430:Microsoft Windows 407:default passwords 313:domain controller 16:(Redirected from 2701: 2670: 2668: 2666: 2654: 2652: 2650: 2644: 2633: 2624: 2622: 2620: 2604: 2602: 2591: 2589: 2587: 2581: 2570: 2568: 2566: 2550: 2548: 2546: 2540: 2531: 2529: 2527: 2503: 2480: 2478: 2472:. Archived from 2471: 2456: 2437: 2418: 2386: 2385: 2383: 2381: 2366: 2360: 2359: 2357: 2355: 2337: 2331: 2330: 2316: 2310: 2309: 2307: 2305: 2299: 2293:. Archived from 2292: 2284: 2275: 2274: 2270: 2264: 2263: 2261: 2259: 2245: 2239: 2238: 2236: 2234: 2220: 2214: 2213: 2206: 2200: 2199: 2197: 2195: 2189: 2183:. Archived from 2172: 2163: 2157: 2154: 2148: 2145: 2139: 2136: 2130: 2129: 2117: 2107: 2101: 2098: 2092: 2091: 2089: 2087: 2081: 2075:. Archived from 2070: 2061: 2055: 2054: 2046: 2040: 2039: 2037: 2035: 2021: 2015: 2014: 2008: 2000: 1994: 1991: 1985: 1982: 1976: 1973: 1967: 1964: 1958: 1955: 1949: 1946: 1940: 1937: 1931: 1928: 1922: 1919: 1913: 1910: 1904: 1901: 1895: 1892: 1886: 1883: 1877: 1874: 1868: 1865: 1859: 1856: 1850: 1847: 1841: 1838: 1832: 1829: 1823: 1820: 1814: 1811: 1805: 1802: 1796: 1793: 1787: 1784: 1778: 1775: 1769: 1766: 1760: 1757: 1751: 1748: 1742: 1739: 1733: 1730: 1724: 1721: 1715: 1712: 1706: 1703: 1697: 1694: 1683: 1680: 1674: 1671: 1665: 1662: 1656: 1653: 1647: 1644: 1638: 1635: 1629: 1626: 1620: 1617: 1611: 1608: 1602: 1599: 1593: 1590: 1584: 1581: 1575: 1572: 1566: 1563: 1557: 1554: 1548: 1545: 1539: 1536: 1530: 1527: 1521: 1518: 1512: 1509: 1503: 1500: 1494: 1491: 1485: 1482: 1476: 1475:Rehberger, p. 73 1473: 1467: 1466:Rehberger, p. 26 1464: 1458: 1457:Rehberger, p. 23 1455: 1449: 1446: 1440: 1437: 1431: 1428: 1422: 1419: 1413: 1412:Rehberger, p. 70 1410: 1404: 1401: 1395: 1392: 1386: 1383: 1377: 1374: 1368: 1365: 1359: 1356: 1350: 1347: 1341: 1338: 1332: 1329: 1323: 1320: 1314: 1311: 1305: 1304:Rehberger, p. 44 1302: 1296: 1293: 1287: 1286: 1284: 1282: 1262: 1256: 1255:Rehberger, p. 72 1253: 1247: 1246:Rehberger, p. 68 1244: 1238: 1237:Rehberger, p. 66 1235: 1226: 1225: 1223: 1221: 1206: 1200: 1199: 1197: 1195: 1181: 1175: 1172: 1166: 1165: 1163: 1161: 1147: 1138: 1137: 1135: 1133: 1119: 1113: 1110: 1104: 1101: 1095: 1092: 1086: 1083: 1074: 1071: 930:Airport security 886:Fort Leavenworth 576:security cameras 553:MITRE ATT&CK 474:operating system 434:Microsoft Office 334:An example of a 256:penetration test 232:digital security 145:RAND Corporation 97:airport security 21: 2709: 2708: 2704: 2703: 2702: 2700: 2699: 2698: 2679: 2678: 2664: 2662: 2657: 2648: 2646: 2642: 2631: 2627: 2618: 2616: 2614:Washington Post 2607: 2600: 2594: 2585: 2583: 2579: 2573: 2564: 2562: 2553: 2544: 2542: 2538: 2534: 2525: 2523: 2521:Military Review 2514: 2511: 2509:Further reading 2506: 2500: 2483: 2476: 2469: 2459: 2453: 2440: 2434: 2421: 2415: 2398: 2394: 2389: 2379: 2377: 2368: 2367: 2363: 2353: 2351: 2339: 2338: 2334: 2318: 2317: 2313: 2303: 2301: 2297: 2290: 2286: 2285: 2278: 2272: 2271: 2267: 2257: 2255: 2247: 2246: 2242: 2232: 2230: 2222: 2221: 2217: 2208: 2207: 2203: 2193: 2191: 2187: 2170: 2165: 2164: 2160: 2155: 2151: 2146: 2142: 2137: 2133: 2126: 2115: 2109: 2108: 2104: 2099: 2095: 2085: 2083: 2079: 2068: 2063: 2062: 2058: 2048: 2047: 2043: 2033: 2031: 2023: 2022: 2018: 2006: 2002: 2001: 1997: 1992: 1988: 1983: 1979: 1974: 1970: 1965: 1961: 1956: 1952: 1947: 1943: 1938: 1934: 1929: 1925: 1920: 1916: 1911: 1907: 1902: 1898: 1893: 1889: 1884: 1880: 1875: 1871: 1866: 1862: 1857: 1853: 1848: 1844: 1839: 1835: 1830: 1826: 1821: 1817: 1812: 1808: 1803: 1799: 1794: 1790: 1785: 1781: 1776: 1772: 1767: 1763: 1758: 1754: 1749: 1745: 1740: 1736: 1731: 1727: 1722: 1718: 1713: 1709: 1704: 1700: 1695: 1686: 1681: 1677: 1672: 1668: 1663: 1659: 1654: 1650: 1645: 1641: 1636: 1632: 1627: 1623: 1618: 1614: 1609: 1605: 1600: 1596: 1591: 1587: 1582: 1578: 1573: 1569: 1564: 1560: 1555: 1551: 1546: 1542: 1537: 1533: 1528: 1524: 1519: 1515: 1510: 1506: 1501: 1497: 1492: 1488: 1483: 1479: 1474: 1470: 1465: 1461: 1456: 1452: 1447: 1443: 1438: 1434: 1429: 1425: 1420: 1416: 1411: 1407: 1402: 1398: 1393: 1389: 1384: 1380: 1375: 1371: 1366: 1362: 1357: 1353: 1348: 1344: 1339: 1335: 1330: 1326: 1321: 1317: 1312: 1308: 1303: 1299: 1294: 1290: 1280: 1278: 1264: 1263: 1259: 1254: 1250: 1245: 1241: 1236: 1229: 1219: 1217: 1208: 1207: 1203: 1193: 1191: 1189:Daniel Miessler 1183: 1182: 1178: 1174:Rehberger, p. 3 1173: 1169: 1159: 1157: 1149: 1148: 1141: 1131: 1129: 1121: 1120: 1116: 1111: 1107: 1102: 1098: 1093: 1089: 1084: 1077: 1072: 1063: 1059: 1054: 986:Bogdan Dzakovic 981: 932: 851: 811:Osama Bin Laden 803: 787: 782: 770: 715: 671: 654: 641: 632: 596: 569: 507: 454: 399:pass the cookie 395:computer memory 301: 261:ethical hackers 240: 225: 164:Robert McNamara 141: 101:law enforcement 43: 28: 23: 22: 15: 12: 11: 5: 2707: 2705: 2697: 2696: 2691: 2681: 2680: 2677: 2676: 2671: 2655: 2625: 2605: 2592: 2571: 2551: 2532: 2510: 2507: 2505: 2504: 2498: 2481: 2457: 2451: 2438: 2432: 2419: 2413: 2405:Crown Business 2395: 2393: 2390: 2388: 2387: 2361: 2332: 2311: 2276: 2265: 2240: 2215: 2201: 2158: 2149: 2140: 2131: 2124: 2102: 2093: 2056: 2041: 2016: 1995: 1986: 1977: 1968: 1959: 1950: 1941: 1932: 1923: 1914: 1905: 1896: 1887: 1878: 1869: 1860: 1851: 1842: 1833: 1824: 1815: 1806: 1797: 1788: 1779: 1770: 1761: 1752: 1743: 1734: 1725: 1716: 1707: 1698: 1684: 1675: 1666: 1657: 1648: 1639: 1630: 1621: 1612: 1603: 1594: 1585: 1576: 1567: 1558: 1549: 1540: 1531: 1522: 1513: 1504: 1495: 1486: 1477: 1468: 1459: 1450: 1441: 1432: 1423: 1414: 1405: 1396: 1387: 1378: 1369: 1360: 1351: 1342: 1333: 1324: 1315: 1306: 1297: 1288: 1257: 1248: 1239: 1227: 1201: 1176: 1167: 1139: 1114: 1112:Hoffman, p. 32 1105: 1096: 1094:Hoffman, p. 39 1087: 1085:Hoffman, p. 37 1075: 1060: 1058: 1055: 1053: 1052: 1047: 1042: 1037: 1032: 1027: 1022: 1017: 1012: 1007: 1002: 997: 992: 982: 980: 977: 931: 928: 859:opposing force 850: 847: 839:Ipcha Mistabra 802: 799: 786: 783: 781: 778: 769: 766: 714: 711: 692:, rather than 670: 667: 653: 650: 640: 637: 631: 628: 612:two-way radios 603:Two-way radios 595: 594:Reconnaissance 592: 568: 565: 506: 503: 485:, restricting 453: 450: 352:query language 344:graph database 336:graph database 300: 297: 239: 236: 224: 221: 195:created a new 176:Yom Kippur War 140: 137: 26: 24: 14: 13: 10: 9: 6: 4: 3: 2: 2706: 2695: 2692: 2690: 2687: 2686: 2684: 2675: 2672: 2660: 2656: 2641: 2637: 2630: 2626: 2615: 2611: 2606: 2599: 2598: 2593: 2578: 2577: 2572: 2561: 2557: 2552: 2537: 2533: 2522: 2518: 2513: 2512: 2508: 2501: 2495: 2491: 2487: 2482: 2475: 2468: 2467: 2462: 2458: 2454: 2448: 2444: 2439: 2435: 2429: 2425: 2420: 2416: 2414:9781101905982 2410: 2406: 2402: 2397: 2396: 2391: 2376: 2372: 2365: 2362: 2350: 2346: 2342: 2336: 2333: 2328: 2327: 2322: 2315: 2312: 2296: 2289: 2283: 2281: 2277: 2269: 2266: 2254: 2250: 2244: 2241: 2229: 2225: 2219: 2216: 2211: 2205: 2202: 2186: 2182: 2178: 2177: 2169: 2162: 2159: 2153: 2150: 2144: 2141: 2135: 2132: 2127: 2121: 2114: 2113: 2106: 2103: 2097: 2094: 2078: 2074: 2067: 2060: 2057: 2052: 2045: 2042: 2030: 2026: 2020: 2017: 2012: 2011:Microsoft.com 2005: 1999: 1996: 1990: 1987: 1981: 1978: 1972: 1969: 1963: 1960: 1954: 1951: 1945: 1942: 1936: 1933: 1927: 1924: 1918: 1915: 1909: 1906: 1900: 1897: 1891: 1888: 1882: 1879: 1873: 1870: 1864: 1861: 1855: 1852: 1846: 1843: 1837: 1834: 1828: 1825: 1819: 1816: 1810: 1807: 1801: 1798: 1792: 1789: 1783: 1780: 1774: 1771: 1765: 1762: 1756: 1753: 1747: 1744: 1738: 1735: 1729: 1726: 1720: 1717: 1711: 1708: 1702: 1699: 1693: 1691: 1689: 1685: 1679: 1676: 1670: 1667: 1661: 1658: 1652: 1649: 1643: 1640: 1634: 1631: 1625: 1622: 1616: 1613: 1607: 1604: 1598: 1595: 1589: 1586: 1580: 1577: 1571: 1568: 1562: 1559: 1553: 1550: 1544: 1541: 1535: 1532: 1526: 1523: 1517: 1514: 1508: 1505: 1499: 1496: 1490: 1487: 1481: 1478: 1472: 1469: 1463: 1460: 1454: 1451: 1445: 1442: 1436: 1433: 1427: 1424: 1418: 1415: 1409: 1406: 1400: 1397: 1391: 1388: 1382: 1379: 1373: 1370: 1364: 1361: 1355: 1352: 1346: 1343: 1337: 1334: 1328: 1325: 1319: 1316: 1310: 1307: 1301: 1298: 1292: 1289: 1277: 1276: 1272: 1267: 1261: 1258: 1252: 1249: 1243: 1240: 1234: 1232: 1228: 1215: 1211: 1205: 1202: 1190: 1186: 1180: 1177: 1171: 1168: 1156: 1152: 1146: 1144: 1140: 1128: 1124: 1118: 1115: 1109: 1106: 1100: 1097: 1091: 1088: 1082: 1080: 1076: 1070: 1068: 1066: 1062: 1056: 1051: 1048: 1046: 1043: 1041: 1038: 1036: 1033: 1031: 1028: 1026: 1023: 1021: 1018: 1016: 1013: 1011: 1008: 1006: 1003: 1001: 998: 996: 993: 991: 987: 984: 983: 978: 976: 972: 970: 965: 961: 957: 953: 949: 941: 936: 929: 927: 925: 921: 913: 908: 904: 902: 898: 897:James F. Amos 893: 891: 887: 883: 878: 874: 869: 867: 862: 860: 856: 848: 846: 844: 840: 836: 831: 828: 824: 816: 812: 807: 800: 798: 796: 792: 784: 779: 777: 774: 767: 765: 763: 758: 754: 750: 748: 743: 739: 736: 728: 723: 719: 712: 710: 709:ignore them. 707: 702: 699: 695: 691: 683: 679: 675: 668: 666: 662: 658: 651: 649: 646: 638: 636: 629: 627: 623: 621: 616: 613: 604: 600: 593: 591: 587: 585: 581: 577: 573: 566: 564: 562: 558: 554: 550: 546: 541: 539: 535: 527: 522: 518: 516: 512: 504: 502: 499: 494: 492: 488: 484: 475: 471: 467: 462: 458: 451: 449: 447: 443: 442:Google Chrome 439: 435: 431: 427: 423: 419: 414: 412: 408: 404: 400: 396: 392: 388: 384: 383:access tokens 380: 376: 372: 368: 363: 361: 357: 353: 349: 345: 337: 332: 328: 326: 322: 318: 314: 309: 305: 298: 296: 294: 289: 287: 282: 281: 275: 273: 269: 264: 262: 258: 257: 252: 251:cybersecurity 247: 245: 237: 235: 233: 229: 223:Cybersecurity 222: 220: 216: 214: 210: 206: 202: 198: 194: 190: 186: 180: 177: 171: 169: 165: 162: 158: 154: 150: 146: 138: 136: 134: 130: 126: 122: 118: 114: 110: 106: 102: 98: 94: 93:cybersecurity 89: 85: 83: 79: 75: 70: 69:cybersecurity 67:, a term for 66: 61: 59: 55: 50: 45: 41: 37: 33: 19: 2663:. Retrieved 2647:. Retrieved 2640:the original 2635: 2617:. Retrieved 2613: 2596: 2584:. Retrieved 2575: 2563:. Retrieved 2559: 2543:. Retrieved 2524:. Retrieved 2520: 2485: 2474:the original 2465: 2442: 2423: 2400: 2392:Bibliography 2378:. Retrieved 2374: 2364: 2352:. Retrieved 2344: 2335: 2324: 2314: 2304:February 25, 2302:. Retrieved 2295:the original 2268: 2256:. Retrieved 2252: 2243: 2231:. Retrieved 2227: 2218: 2204: 2192:. Retrieved 2185:the original 2174: 2161: 2152: 2143: 2138:Zenko, p. 59 2134: 2111: 2105: 2096: 2084:. Retrieved 2077:the original 2072: 2059: 2044: 2032:. Retrieved 2028: 2019: 2010: 1998: 1989: 1980: 1971: 1962: 1953: 1944: 1935: 1926: 1917: 1908: 1899: 1890: 1881: 1872: 1863: 1854: 1845: 1836: 1827: 1818: 1809: 1800: 1791: 1782: 1773: 1764: 1755: 1746: 1737: 1728: 1719: 1710: 1701: 1678: 1669: 1660: 1651: 1642: 1633: 1624: 1615: 1606: 1597: 1588: 1579: 1570: 1561: 1552: 1543: 1534: 1525: 1516: 1507: 1498: 1489: 1480: 1471: 1462: 1453: 1444: 1435: 1426: 1417: 1408: 1399: 1390: 1381: 1372: 1363: 1354: 1345: 1336: 1327: 1318: 1309: 1300: 1291: 1279:. Retrieved 1269: 1260: 1251: 1242: 1218:. Retrieved 1213: 1204: 1192:. Retrieved 1188: 1179: 1170: 1160:December 23, 1158:. Retrieved 1154: 1130:. Retrieved 1126: 1117: 1108: 1103:Zenko, p. 57 1099: 1090: 1073:Zenko, p. 56 1040:Murder board 1025:Hacker ethic 973: 945: 917: 900: 894: 870: 863: 852: 838: 832: 822: 820: 788: 775: 771: 759: 755: 751: 744: 740: 732: 716: 706:radio jammer 703: 694:lock picking 687: 678:Lock picking 663: 659: 655: 642: 633: 630:Infiltration 624: 617: 608: 588: 571: 570: 542: 531: 508: 495: 487:Secure Shell 479: 455: 415: 364: 341: 310: 306: 302: 292: 290: 279: 278: 276: 267: 265: 254: 248: 243: 241: 227: 226: 217: 181: 172: 157:Soviet Union 142: 121:Marine Corps 90: 86: 62: 57: 48: 46: 44: 2490:Basic Books 2354:October 13, 2326:Denver Post 2233:October 23, 2194:October 23, 735:server room 727:server room 639:Preparation 509:The use of 280:purple team 238:Terminology 151:during the 58:red teaming 56:. The term 18:Red teaming 2683:Categories 1127:WhatIs.com 1057:References 1035:Metasploit 1015:Groupthink 849:Militaries 698:RFID locks 489:(SSH) and 464:A network 375:ciphertext 367:credential 293:white team 286:groupthink 185:board game 54:groupthink 36:Tiger team 2053:(Report). 956:Lockerbie 791:Microsoft 747:borescope 498:honeypots 491:Bluetooth 428:(COM) on 371:passwords 259:involves 244:blue team 205:terrorism 111:. In the 65:blue team 2665:June 17, 2649:June 17, 2619:June 17, 2586:June 17, 2565:June 17, 2545:June 17, 2526:June 17, 2463:(2010). 2228:army.mil 2086:July 19, 1220:April 3, 1194:April 3, 1010:Grey hat 979:See also 960:Scotland 817:in 2011. 652:Approach 483:firewall 470:Internet 466:firewall 446:Selenium 440:'s COM, 411:phishing 389:such as 354:such as 268:red team 209:Iraq War 203:such as 197:Red Cell 153:Cold War 105:military 49:red team 40:Red Team 2380:June 3, 2258:May 24, 2034:June 2, 1281:May 23, 1214:Redscan 1132:May 14, 1030:IT risk 452:Defense 139:History 74:cookies 2496:  2449:  2430:  2411:  2122:  857:, the 795:Google 584:fences 582:, and 379:hashes 356:Cypher 299:Attack 131:, and 107:, and 103:, the 2643:(PDF) 2632:(PDF) 2601:(PDF) 2580:(PDF) 2539:(PDF) 2477:(PDF) 2470:(PDF) 2298:(PDF) 2291:(PDF) 2188:(PDF) 2171:(PDF) 2116:(PDF) 2080:(PDF) 2069:(PDF) 2029:ZDNET 2007:(PDF) 954:over 780:Users 690:shims 682:shims 645:MOLLE 580:locks 381:, or 2667:2023 2651:2023 2621:2023 2588:2023 2567:2023 2547:2023 2528:2023 2494:ISBN 2447:ISBN 2428:ISBN 2409:ISBN 2382:2023 2356:2015 2306:2017 2260:2023 2235:2017 2196:2017 2120:ISBN 2088:2011 2036:2023 1283:2023 1222:2022 1196:2022 1162:2020 1134:2023 864:The 793:and 420:and 253:, a 117:Army 80:and 391:Git 249:In 32:AMD 2685:: 2634:. 2612:. 2558:. 2519:. 2492:. 2488:. 2407:. 2403:. 2373:. 2347:. 2343:. 2323:. 2279:^ 2251:. 2226:. 2179:. 2173:. 2071:. 2027:. 2009:. 1687:^ 1273:, 1268:. 1230:^ 1212:. 1187:. 1153:. 1142:^ 1125:. 1078:^ 1064:^ 971:. 958:, 926:. 745:A 725:A 696:. 578:, 524:A 448:. 393:, 377:, 373:, 291:A 277:A 266:A 242:A 215:. 135:. 127:, 123:, 119:, 99:, 95:, 47:A 2669:. 2653:. 2623:. 2590:. 2569:. 2549:. 2530:. 2502:. 2455:. 2436:. 2417:. 2384:. 2358:. 2329:. 2308:. 2262:. 2237:. 2212:. 2128:. 2090:. 2038:. 2013:. 1285:. 1224:. 1198:. 1164:. 1136:. 942:. 684:. 42:. 20:)

Index

Red teaming
AMD
Tiger team
Red Team
groupthink
blue team
cybersecurity
cookies
Rules of engagement
standard operating procedures
cybersecurity
airport security
law enforcement
military
intelligence agencies
United States government
Army
Marine Corps
Department of Defense
Federal Aviation Administration
Transportation Security Administration
RAND Corporation
United States military
Cold War
Soviet Union
United States Secretary of Defense
Robert McNamara
arms control treaty
Yom Kippur War
board game

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑