Red teams can show flaws that exist in your network before they are compromised by malicious actors and blue teams traditionally assess current security measures and identify security flaws. The teams can provide valuable feedback to each other, but this is often overlooked, enter the purple team.
- Initial Access
- Execution
- Persistence
- Privilege Escalation
- Defense Evasion
- Credential Access
- Discovery
- Lateral Movement
- Collection
- Command and Control
- Exfiltration
Purple Team Field Manual is a must have for every cyber security professional. The purple team field manual integrates red and blue team methodologies, and aligns TTP's to the MITRE ATT&CK Matrix. It also contains useful reference command reference guides for networking. Don't wait get your copy now.