How to Become a Red Team Operator
Вставка
- Опубліковано 8 чер 2024
- Hacking is cool. Getting paid to hack companies is even cooler.
Red teaming is much more than just penetration testing. Operators on red teams often spend a significant amount of time and energy examining the full extent that a breach could exploit a particular organization or system. They do all of this in order to HELP the company, not hurt it.
In this Q&A highlight reel of our full-length interview ( • What's It Like As A Re... ), Chris provides his top recommendations for becoming a red team operator. He also gives an in-depth perspective at the red teaming lifestyle.
Red Team Hacking Process
1. Conduct reconnaissance
2. Gather personal information
3. Send spear fishing emails
4. Wi-fi man-in-the-middle
5. Keylog credentials
00:00 Intro
00:07 Getting Started
01:25 Programming Language
01:48 What is a Red Team
02:49 Pentester vs. Red Team
04:46 The Hacking Process
06:33 Salary
06:45 Cyber Pro Picks
07:05 Digital Security Recommendations
________________________________________________________________
Resources
Wireshark: www.wireshark.org/
Burp Suite: portswigger.net/burp/
Metasploit: www.metasploit.com/
________________________________________________________________
FOLLOW and SUBSCRIBE!
👉 UA-cam: / cyberspatial
👉 Twitter: / cyberspatial_hq
👉 Facebook: / cyberspatial
👉 Instagram:
/ cyberspatial
👉 LinkedIn: / cyberspatial
#CyberSecurity #RedTeam #Hacking
Hell yea, the most underrated channel ever..
Zapper 237 thanks! Tell your friends about us so we can be...appropriately rated?
@@Cyberspatial Ya, but no need to tell them.. Because my Friends already subscribed to you Long Long ago...
Zapper 237 haha glad to hear it!
I really enjoy the way you bring your content. It kept my attention from 0:00 to 8:19. Keep up the good work!
Glad you enjoy it!
Let us know if there's anything topics you'd like to see covered.
I absolutely love your channel! Especially for the time that you put into it. Literally, anyone from beginner to advanced definitely has an awesome lot, if not all, to learn from your vids. Thank you.
Thank you so much!
Great thanks for your patience and help 👍
Fantastic interview. Thanks.
Really cool video! Thanks for sharing.
Great stuff, thank you and keep it up!
Great video. I am looking at doing Red Teaming and the answers he gave is extremely helpful. Time to learn and study Python.
Thanks for guiding me ❤️
Glad to help!
Brilliantly explained.
It might have helped that I know a lot of terms you used, but the examples made it easy to understand for all. Noice
Appreciate it. And yes, should have maybe defined them a bit better. But it does make you look them up, no?
@@Cyberspatial The analogies used define the terms pretty clear I guess. Still yeah, looking up terms will make the viewer understand even better for himself.
Enjoyed 😍👏👏👏 thanks for The vedio ♥️
Gaya De glad you liked it!
i like your content so much, very very informative.
Happy to hear that!
I'd like to recommend to create video for how to land a job in cyberspace...anyways this was a great video
Thanks! Will add your recommendation on our project list. :)
After CCNA, what should I study to became empowered Red teamer?
very informative video.
Thanks!
Thanks❤️
Me:
Best hacker movie: Live Free or Die Hard (Die Hard 2.0)
Best hacker TV show: Mr. Robot
Email: Protonmail
Those are great answers
Hey can you tell this guy's story like his schooling his certs his degrees and what a school out guy should do to become a red teamer?? Btw i didn't lose my attention a second keep up the good work
Good content, please keep the volume of the music down for subsequent videos.
Thanks, will do!
U got a new subscriber...you are awesome 👍
Welcome aboard!
Hey question for those in the know. If im in public, I have a VPN, and i connect to a public wifi, the VPN would protect from MItM attacks, right?
But if I connected to a malicious AP (i.e a Pineapple) would my VPN do anything?
Yes, for the most part. If the attacker has compromised the server's certificate they can MiTM the VPN connection itself. A malicious AP can do things like deny you Internet or make it slow until you decide to turn off your VPN. If your isn't going over the VPN or DNS-over-HTTPS, it can still redirect you to malicious sites.
My favourite youtube channel
Thanks!
You got a subscriber!
Thank You! Welcome aboard!
If I'm already 30 with currently 0 IT knowledge do you think I can realistically learn enough in the next few years to become a pen tester/red teamer?
Everything is possible if you are willing to put the effort into it. Maybe start by getting a ccna by cisco and then just try to work your way up in the knowledge tree. Another advice would be to go to wikipedia pages about it-related topics you feel kinda safe with and then just click through all the links on the page and try to understand the background of things. This can take you quite deep into things sometimes. Good luck dude
Great video. Thank you
Damn, good video
Thanks!
What's the difference between a red teamer and a white hacker and pentesting
Excaliber white hat hacker is a little bit more broad of a term than a red teamer. White hat hackers are essentially anyone who does ethical hacking/pentesting.
But a red team operator is someone that holds a job and is assigned to a company’s red team. They often do a lot more than just pen testing. Think of it like most red teamers are white hat hackers but not all white hat hackers are red teamers.
@@Cyberspatial oh OK thanks
Music is a bit too much...
Working on it.
This is exactly what I want to do
Need an OP tution to be advised of tradition please.
your are the reason that am continue in cybersecurity thank legend.
and I culdn't find the hacker movie "never seen a good on" how I can found it ?
Lol, he meant "he's never seen a good hacker movie"
Hackers is a fun movie (ft Angelina Jolie)
@@Cyberspatial Lol I've Watched It Thanks😂
Great video! Helped me a lot. But come on man You havent seen any good movie?
❤❤
Don't click on links of places you don't know.
Wait.....Gmail?
GMAIL!?...I think he meant to say protonmail
Gmail is very darn secure. Very up to date. They even support ipv6. Proton mail doesn't even have ipv6 available. Looks very 1990s, maybe 2000s. If you care about your e-mail, don't trust them. If you're using windows don't worry about ipv6. It's very likely it doesn't support it either.
It really depends on your threat model. ProtonMail is better from a privacy perspective, but Gmail has some really great anti-spam and anti-phishing capabilities.
#blueteam
#greenteam
hey this didn't tell me how to become red team from halo wars bad video!!!!
nah but this was a very good video, good job.
Even though theraphy prevails the mocking of a life team exist.hint to agenda address summon please.
Music is distracting
Getting better.
This video is fake, Red team is a team of nine mercenaries in New Mexico that fight against Blu team
Surprised he picked Android over iPhone, as iPhone is generally the more secure smartphone. Right?
Lot of tech fans like the customization, control, and root-ability of Android. "Which one is more secure" is a really complicated question. If your threat model includes nation-states buying spytech tools with zero-days, neither are going to help you. A reliable, full-chain, remote exploit for either iOS or Android will run $2-3 million. If your threat model is accidentally downloading malicious software in from the App Store or Play store, iOS tends to have a bit better of a reputation. This is a much more common threat vector.
Late comment, but it is very common for people who get in depth into computers to prefer open source technologies. Especially, considering his job.
Hahahah wow holy shit his introduction story lol. Thats just terrible
It may or may not have happened. 😅