paul78 said: One other reason for not disabling or throttling back countermeasures is because most companies can't really identify if it's our analysts or a real adversary.
JDMurray said: Pentests are overt, scheduled, and part of security auditing. Pentests are used to improve network security by finding (possibly) exploitable vulnerabilities. The Blue Team (i.e., SOC) will be informed of the pentester's activity, and ignore the activity they see from the pentester's source IPs. You do not actually "defend" against a pentest any more than you would actively defend against a vulnerability scan.In comparison, a Red Team's activities are private, unscheduled, and, if detected, are expected to be regarded as an actual attack (incident). The purpose of a Red Team is to make the Blue Team better. The Blue Team will actively detect and defend against Red Team activity because it is an actual, unannounced attack from an unknown source. In Red Team exercises, it is the performance of the Blue Team that is being measured rather than the security of the network. The lessons learned from the exercise will be used to improve the Blue Team.
tedjames said: paul78 said: One other reason for not disabling or throttling back countermeasures is because most companies can't really identify if it's our analysts or a real adversary. Unless you give the client your source IPs... Then they'll know for sure that you are the ones doing the attacking.
paul78 said:We haven't found that to be effective. Because once we gain a foothold, our targets typically can't tell it's us. To be honest, it really depends on the scope of the engagement - a lot of pen testing scopes these days are routine to the point of being useless. The routine testing still serve a purpose but if that's all an organization does - it's usually just a checkbox that they are seeking. Some of our clients only want those types of pentest so we do it. We usually try to encourage them to increase scope - heck - we don't even increase the fee. Usually what ends up happening is that we end up as their secondary pen test company.
iBrokeIT said: paul78 said:We haven't found that to be effective. Because once we gain a foothold, our targets typically can't tell it's us. To be honest, it really depends on the scope of the engagement - a lot of pen testing scopes these days are routine to the point of being useless. The routine testing still serve a purpose but if that's all an organization does - it's usually just a checkbox that they are seeking. Some of our clients only want those types of pentest so we do it. We usually try to encourage them to increase scope - heck - we don't even increase the fee. Usually what ends up happening is that we end up as their secondary pen test company. Lack of detection should be a critical finding. IF you detect them, yes whitelist and allow them to continue.
iBrokeIT said: Unless you have the budget for both red teaming AND a pentest why would you not want to test and validate that your detective controls are working as part of a pentest?
iBrokeIT said: What is the ratio of red team engagements vs pentests that your company performs?