How we Attack

Longitudinal penetration is the first stage of red team assessment, which mainly adopts network & application penetration, social engineering, post-penetration testing, physical penetration testing and other offensive and defensive methods to evaluate the security of network systems from the perspective of hackers.
Horizontal penetration is the second stage of the red team assessment, which mainly adopts the concealment of penetration test traces, lateral movement of the internal network, and the acquisition of key targets, data, and control to expand the results of the red team assessment.

Deliverables

Weekly progress report
- Summary of work
- Progress status
- Planned for next week

Final deliverables
The Red Team Assessment Report
- Summary of the attack
- Details of the attack process
- Attack path and outcome
- Scripts and tools used
- Summary and suggestions for improvement