Chapter 4: Progressive Red Teaming Operations
Red teaming a mature organization requires looking for new ways and ideas to uncover threats to the organization and explore the impact they might have. Currently, Chief Information Security Officers (CISOs) already struggle with keeping up against traditional threats and attacks. This means that the more recent threats to the business are not adequately covered or explored at all.
At the same time, we need to keep covering the basics as well. For instance, a lot of red teaming operations focus on acquiring domain administrative privileges in an organization, which is an important aspect to cover regularly.
This chapter discusses a set of ideas for alternative red teaming operations to help keep your organization and blue team on their feet. To provide examples, we will explore progressive ideas such as cryptocurrency mining, red teaming for privacy violations, as well as topics such as social media attacks that specifically target...