Summary
In this chapter, we discussed the ins and outs of Red Team exercises, how they differ from penetration testing, and how the Blue Team fits into things. We then performed an example Red Team engagement for Company Z, where we attacked their ICS and successfully replaced the running firmware of a PLC that is sitting on their industrial network, "safely" tucked away behind a firewall, segmented off from the enterprise network. Along the way, we discussed potential opportunities for the Blue Team to catch our activities and discussed recommendations around better securing the setup.
What we covered in the example Red Team exercise only showed a single approach to accomplishing our goals. By no means should this be used as a playbook to perform such assessments, but it should be used as a guideline to direct you through the phases of an attack.
In the next chapter, we will discuss the ins and outs of a penetration test and get hands-on experience performing one for...