»Ubuntu for Redteam operations«
2019-10-11, 14:30–15:00, A1 Ubuntu Auditorium

Redteam goes beyond the technological vulnerability: it is a human team, which carries out attacks (always controlled) to an objective and scope, which has been previously defined by the client and under a contract of confidentiality. This talk will explain how Ubuntu contributes to Redteam operations and the tools and distributions based on Ubuntu for this purpose.

Redteam goes beyond the technological vulnerability: it is a human team, which carries out attacks (always controlled) to an objective and scope, which has been previously defined by the client and under a contract of confidentiality. Redteam must represent a real threat, constant over time, and this his real threat must be carried out until the final objective is achieved: manipulate, filter, steal information, denial of service or fraud. To achieve this the team can use a variety of techniques used in conventional intrusion test, and also attack the human part with social engineering. For example: phishing, malware and ransomware. The ultimate goal is to assess the safety of a technological infrastructure and to collaborate with the blue team, the defense team, for the fortification of an organization's systems. This talk will explain how Ubuntu contributes to Redteam operations and the tools and distributions based on Ubuntu for this purpose.