Building a Red Team: Where’s the How-to?
I know you're supposed to be good and familiar with Metasploit. Or, java. Or, probably lockpicking, right? Or, is it vishing? Here's the gap I'm seeing - I haven't been able to find reliable guides on developing a 'red team'. And I'll be honest - I like that phrase - the 'read team'. From what I've been able to tell, the culture that surrounds pentesting, red teaming, offensive security or how-ever-else you're looking to be involved in 'that side' of infosec is sort of limiting. Not limiting in the way that some hobbies or activities have gatekeepers, but more from [...]