Red team penetration test

Before you begin: Read the Project #1 description (attached to the Project #1a assignment folder) paying special attention to the Red Team’s report.For this week’s discussion our focus will be upon developing a brief (1-2 page) forensics data collection plan to be used during a Red Team exercise. Your plan will be used as part of training exercise for incident response personnel to help them learn to identify and collect evidence.Your first task is to analyze the Red Team’s report to determine what they attacked or what attack vectors were used. Next, analyze the environment to determine what types of forensic evidence should be collected after the attack(s) and where that evidence can be collected from. You should consider both volatile sources such as RAM (memory) and static sources such as disk drives, thumb drives (USB storage devices), etc. After you have identified the types of evidence and the devices from which evidence should be collected, document that in your short paper (the “plan”).At a minimum your plan must document evidence collection for three specific attack vectors or vulnerabilities that were exploited by the Red Team as part of its penetration testing. For each vector or vulnerability, document what type of evidence could be collected and where the evidence should be collected from.
(Read through)-Red Team Penetration TestingSifers-Grayson hired a cybersecurity consulting firm tohelp it meet the security requirements of a contract with a federal agency. Theconsulting firm’s Red Team conducted a penetration test and was able to gainaccess to the engineering center’s R&D servers by hacking into theenterprise network through an unprotected network connection (see figure 2).The Red Team proceeded to exfiltrate files from those servers and managed tosteal 100% of the design documents and source code for the AX10 Drone System.The Red Team also reported that it had stolen passwords for 20% of the employeelogins using keylogging software installed on USB keys that were left on thelunch table in the headquarters building employee lounge (see Figure 3). TheRed Team also noted that the Sifers-Grayson employees were quite friendly andtalkative as they opened the RFID controlled doors for the “new folks” on theengineering staff (who were actually Red Teamers).The Red Team continued its efforts to penetrate theenterprise and used a stolen login to install malware over the network onto aworkstation connected to a PROM burner in the R&D DevOps lab (See Figure3). This malware made its way onto a PROM that was then installed in an AX10-atest vehicle undergoing flight trials at the Sifers-Grayson test range (SeeFigures 1 and 4). The malware “phoned home” to the Red Team over a cellularconnection to the R&D center. The Red Team took control of the test vehicleand flew it from the test range to a safe landing in the parking lot at Sifers-Graysonheadquarters.The Red Team used three stolen logins to send PhishingEmails to employees. These phishing emails appeared to come from coworkers(employees of the company) and contained a link to one of three videos. Eachvideo was linked to a server that tracked the email address and IP address ofthe computer used to access the video. The Red Team reported that over 80% ofthe recipients clicked on the video link for cute kittens or cutecats. Twenty percent (20%) of the recipients clicked on the video link fora business news story. A video link to a sports event wrap-up for the KentuckyVolunteers basketball team had over 95% click-through rate. All three videosdisplayed a “Page Not Found (404 Error)” message from the target server. TheRed Team did not put a tracking beacon in the emails to track forwarding of thephishing emails. But, the team reported that the target server collected emailaddresses and IP addresses for over 1500 external recipients within 24 hours ofthe original mailing; at that point, the target server was shutdown.After completing their penetration tests, the Red Teamprovided Sifers-Grayson executives with a diagram showing their analysis of thethreat environment and potential weaknesses in the company’s security posture forthe R&D DevOps Lab (see figure 5).

Calculate your paper price
Pages (550 words)
Approximate price: -

Why Choose Us

Quality Papers

We value our clients. For this reason, we ensure that each paper is written carefully as per the instructions provided by the client. Our editing team also checks all the papers to ensure that they have been completed as per the expectations.

Professional Academic Writers

Over the years, our Acme Homework has managed to secure the most qualified, reliable and experienced team of writers. The company has also ensured continued training and development of the team members to ensure that it keep up with the rising Academic Trends.

Affordable Prices

Our prices are fairly priced in such a way that ensures affordability. Additionally, you can get a free price quotation by clicking on the "Place Order" button.

On-Time delivery

We pay strict attention on deadlines. For this reason, we ensure that all papers are submitted earlier, even before the deadline indicated by the customer. For this reason, the client can go through the work and review everything.

100% Originality

At Graduate Assistants, all papers are plagiarism-free as they are written from scratch. We have taken strict measures to ensure that there is no similarity on all papers and that citations are included as per the standards set.

Customer Support 24/7

Our support team is readily available to provide any guidance/help on our platform at any time of the day/night. Feel free to contact us via the Chat window or support email:

Try it now!

Calculate the price of your order

We'll send you the first draft for approval by at
Total price:

How it works?

Follow these simple steps to get your paper done

Place your order

Fill in the order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits you most.

Receive the final file

Once your paper is ready, we will email it to you.

Our Services

Graduate Assistants has stood as the world’s leading custom essay writing services providers. Once you enter all the details in the order form under the place order button, the rest is up to us.


Essay Writing Services

At Graduate Assistants, we prioritize on all aspects that bring about a good grade such as impeccable grammar, proper structure, zero-plagiarism and conformance to guidelines. Our experienced team of writers will help you completed your essays and other assignments.


Admission and Business Papers

Be assured that you’ll definitely get accepted to the Master’s level program at any university once you enter all the details in the order form. We won’t leave you here; we will also help you secure a good position in your aspired workplace by creating an outstanding resume or portfolio once you place an order.


Editing and Proofreading

Our skilled editing and writing team will help you restructure you paper, paraphrase, correct grammar and replace plagiarized sections on your paper just on time. The service is geared toward eliminating any mistakes and rather enhancing better quality.


Technical papers

We have writers in almost all fields including the most technical fields. You don’t have to worry about the complexity of your paper. Simply enter as much details as possible in the place order section.