Red Team: RedTeaming VS PenTesting

  Рет қаралды 17,198

David Probinsky

David Probinsky

Жыл бұрын

Lets discuss the basics of PenTesting Vs Red Teaming in this beginner-friendly KZfaq video. Discover how PenTesting helps identify vulnerabilities, while Red Teaming provides a more comprehensive evaluation of an organization's security. Gain insights into these cybersecurity practices and understand their importance in securing digital systems!
For a full list of my Covert Entry tools, check out my github at:
github[.]com/davidprobinsky
Check out my IG at @ RedTeamVIP
Backdrop Image by kjpargeter on Freepik

Пікірлер: 41
@yikesdarnell
@yikesdarnell Жыл бұрын
This is fantastic, as a person who is interested in red team, you gave me a good glimpse and a better picture of what it takes. Keep producing more information about this area. 👏🏽
@DavidProbinsky
@DavidProbinsky Жыл бұрын
Absolutely! And thank you for the feedback!! More vids coming soon!
@springbloom5940
@springbloom5940 Жыл бұрын
One of the things a PMC I worked for did was PHYSEC evaluation. The way Id characterize the difference between pen testing and red teaming (we didn't really call it that) was that pen testing was more academic. The testers would go around and check the individual security measures and give the client a walkthrough report; this is a bad lock, your camera has a blindspot, etc. The red teaming was malicious. We hit live targets and actually tried to 'do damage', like taking stuff, or compromising infrastructure; or simulation thereof. The social engineering aspect is a good metric. On one target, we were to access some materials. The location they were in, had soft physical security that we could defeat in seconds, but not without getting caught by the Human security during the access. We 'social engineered' the security operation, by overtly attacking the physical elements a couple times, like just unlocking the door and leaving it ajar, on a passby. So, they moved the materials to a harder location, but because it was physically harder, they skimped on the Human security. That gave us about 30 min with the objective, which was bout 20 more than we needed. Generally speaking, the teams had no contact with the client and in many cases, part of the exercise was timing the client to find out how long it took to discover the compromise and react.
@DavidProbinsky
@DavidProbinsky Жыл бұрын
I totally agree with you, the purpose is to help clients improve their security, as well as measuring their timing and reaction against a threat. As for the terms, I don't have a military background, but Ive heard of a few different names depending the types of engagement and sector in which its discussed, Ive even heard the term "Tiger Teams". In the Infosec & IT field I'm noticing more and more the use of the term "Red Team" for offensive security engagements, and all is performed from behind a computer. My goal with the video was to keep it simple for those coming new to IT for the first time, and bring a bit of awareness to the table about Social Engineering as well as Physical Security. Also, thank you for sharing your experience!!
@hertechprep
@hertechprep 3 ай бұрын
Omg! This has to be the best video on explaining Red Team and the difference between the other two roles. I initially thought Red team was Pentest. After you explained Red Team all I could think about was Mr. Robot! Excellent video! No fluff just straight to the point!! Thank you!
@DavidProbinsky
@DavidProbinsky 2 ай бұрын
Thank you for the feedback! ❤️
@nerdybutnice2267
@nerdybutnice2267 2 ай бұрын
Very helpful and thorough explanation, thank you!
@user-by6zz7wq9n
@user-by6zz7wq9n 8 ай бұрын
Thank you! A perfect, short and clear explanation of the difference between PenTesting, Ethical Hacking and RedTeaming
@DavidProbinsky
@DavidProbinsky 8 ай бұрын
Thanks for the feedback! 🙌
@quintontillmon1620
@quintontillmon1620 2 ай бұрын
Thank you for sharing. You've earned another subscriber for sure.
@cloey_b
@cloey_b 8 ай бұрын
Hi David! thank you for this video. Very good information :)
@DavidProbinsky
@DavidProbinsky 8 ай бұрын
Thank you for the feedback! Glad you enjoyed it!
@user-cl3jb8kk5g
@user-cl3jb8kk5g 5 ай бұрын
really appreciate, now I don`t have to waste my time anymore on pen testing, I just wanna sit behind my laptop
@blablawtf
@blablawtf 4 ай бұрын
Made it very easy to understand, subscribed!
@DavidProbinsky
@DavidProbinsky 2 ай бұрын
Awesome, thank you!
@altcoinwizz
@altcoinwizz 3 ай бұрын
Great video David thanks!
@DavidProbinsky
@DavidProbinsky 2 ай бұрын
Glad you liked it!
@Singsing-js9fl
@Singsing-js9fl 6 ай бұрын
best explanation every, can u make a vid about the roadmap of each and what certifications to get. thanks, hope you will do.
@HossamOcta
@HossamOcta 11 ай бұрын
Bro you’re awesome and simple ❤❤
@DavidProbinsky
@DavidProbinsky 10 ай бұрын
I appreciate that!
@AnshBathla-tz8kl
@AnshBathla-tz8kl 7 ай бұрын
Great video.
@thatocyberspace
@thatocyberspace 8 ай бұрын
Well explained.
@forresttindall
@forresttindall 10 ай бұрын
great video! you have earned the sub!
@DavidProbinsky
@DavidProbinsky 10 ай бұрын
Thanks for the sub! 🙏
@losxlakers
@losxlakers 4 ай бұрын
How do you get a job? I know someone who got their OSCP and still couldn’t get a job.
@yuck871
@yuck871 3 ай бұрын
Maybe actually study IT or cybersecurity at a university before applying for a job
@carlosbautistazenpay6373
@carlosbautistazenpay6373 6 ай бұрын
Great explanation! 👌👌
@DavidProbinsky
@DavidProbinsky 6 ай бұрын
Glad it helped!
@KaliLinux-vn3ws
@KaliLinux-vn3ws 5 ай бұрын
Is wifi pineapple or adaptor, hacking devices flipper zero , hackrf are used in penetration testing ?
@DavidProbinsky
@DavidProbinsky 2 ай бұрын
The Wifi Pineapple is used often, yes. The Flipper, sometimes, not as often. The hackrf, I personally have never used it in an engagement. Now USB implants, such as the rubber ducky or the Key Croc keylogger, I use very often.
@jourdanallred7121
@jourdanallred7121 10 ай бұрын
A cantanna? Any useful links to read more on this and build one
@DavidProbinsky
@DavidProbinsky 10 ай бұрын
Yeah, they are called Cantenna (Can + Antenna). This post is a bit old, but it should provide you with more info: jacobsalmela.com/2013/09/07/wi-fi-cantenna-2-4ghz-how-to-make-a-long-range-wi-fi-antenna/
@jagatkrishna1543
@jagatkrishna1543 6 ай бұрын
Thanks 👍❤
@DavidProbinsky
@DavidProbinsky 6 ай бұрын
Always welcome
@404NotFoundBitch
@404NotFoundBitch 8 ай бұрын
Great
@camronbay1
@camronbay1 Жыл бұрын
Camrahnbay subscribed.
@Engsfscrypto
@Engsfscrypto 6 ай бұрын
Well thanks you sir ,I follow you 🎉🎉🎉🎉🎉🎉🎉🎉🎉🎉🎉🎉🎉🎉🎉🎉🎉🎉🎉🎉🎉🎉🎉🎉
@Sakuraigi
@Sakuraigi Ай бұрын
Red teamer is a apy
@Waferdicing
@Waferdicing 8 ай бұрын
🫶🫶🫶🫶🫶
@haroldvelasquez9631
@haroldvelasquez9631 6 ай бұрын
This is great David! I didn’t know you had this channel 🫡
@DavidProbinsky
@DavidProbinsky 6 ай бұрын
Thanks for the feedback! Yeah, been quietly making videos this past year, and trying to shift gears and make more content.
What's It Like As A Red Team Operator? (w/ Chris M.)
47:49
Cyberspatial
Рет қаралды 105 М.
[53] How To Become a Physical Penetration Tester
12:15
TheNotSoCivilEngr
Рет қаралды 44 М.
One moment can change your life ✨🔄
00:32
A4
Рет қаралды 34 МЛН
تجربة أغرب توصيلة شحن ضد القطع تماما
00:56
صدام العزي
Рет қаралды 59 МЛН
Heartwarming moment as priest rescues ceremony with kindness #shorts
00:33
Fabiosa Best Lifehacks
Рет қаралды 38 МЛН
6 Must-Have Security Gadgets That Fit in Your Pocket
9:03
All Things Secured
Рет қаралды 1,8 МЛН
How Hackers Move Through Networks (with Ligolo)
20:01
John Hammond
Рет қаралды 260 М.
[51] What's in my Covert Entry Bag?
15:49
TheNotSoCivilEngr
Рет қаралды 90 М.
Red Team: My EDC (Every Day Carry) gear
8:30
David Probinsky
Рет қаралды 15 М.
[52] Using Food to Bypass Security: Red Team Stories
5:41
TheNotSoCivilEngr
Рет қаралды 33 М.
Do you have what it takes to get into Cybersecurity in 2024
8:57
Tech with Jono
Рет қаралды 447 М.
Red Team: Tips and Tricks for Social Engineering!
10:30
David Probinsky
Рет қаралды 470
Я купил первый в своей жизни VR! 🤯
1:00
iPhone 15 Pro в реальной жизни
24:07
HUDAKOV
Рет қаралды 437 М.
Как распознать поддельный iPhone
0:44
PEREKUPILO
Рет қаралды 2,1 МЛН
Сколько реально стоит ПК Величайшего?
0:37