The desired aim of a Red Team attack is not so much a structured method as it is a pragmatic evidence that security lacunae exist at all; as far as possible, the most serious lacuna should be found and documented.

This often serves as the basis for further measures, like structured penetration test of web applications, external and internal networks or the employee training after a social engineering attack.


Contact us f
or consultancy and further information.

Dieser Text ist auch verfügbar auf: DE