Red Team
Just as penetration testers try to get access to an organisation electronically, red teams try to get physical access to the organisation. They use a combination of Open Source Intelligence gathering and social engineering to get access.
These teams are typically engaged by senior management to test processes such as visitor registration, tailgating, signing in, staff challenging non-wearers of passes etc.
Remote access
As the name suggests, this is the process of providing access to systems from a remote location. For example, many people are given access to their work systems when not in the office. This uses remote access tools including VPNs and Two Factor Authentication, or a combination of multiple tools. It means you don’t physically have to be in the office to access your work systems.
RAT
A Remote Access Trojan (RAT) is a piece of malware which enables attackers to gain control of a target machine from a remote location. When attackers use phishing techniques, the first step after a link is created is often to implement a RAT. This enables an attacker to get access to the device and carry on their attack using other tools.
Router
A router is a network device which examines network traffic and forwards it to the most appropriate part of the network.
[…] to replace files which are inadvertently deleted, or as an alternative to paying the ransom in a ransomware […]
LikeLike
[…] takes many forms, and just as with hacking there are people who do social engineering for good (eg red team members) and those who do it for nefarious purposes (eg con […]
LikeLike
[…] sure that your remote access solution has been penetration tested recently, and that any urgent, high or medium issues have been […]
LikeLike