For those who are not in the security field, the Red Team can mimic the real-world attacker tracking system and is an effective choice for a company to test security software. The Red Team project is an incubator for open source security tools, including network cyber range automation, containerized penetration testing tools, binary risk quantification, and standard verification procedures.
This project is not created out of thin air, but based onFedora Red Team Special Interest Group. Jason Callaway, now a Google customer engineer, at the timeOpened "Fedora Red Team SIG. The Red Team project has some vulnerability mapping tools that you want to build, and you want to makeCyber-ITL projectOpen source implementation.
The Cyber-range mentioned here refers to the virtual space that simulates hacker attacks, which is theoretically carried out on the cloud. A network attack and defense includes vulnerable machine images, vulnerable application configurations, attack platforms, exploits, and operators. Users can deploy hacker scripts to represent real-world situations.Red and blue teamConduct safety training. To put it bluntly, it is to use your security infrastructure to conduct "war games."
The open source CTL (Cyber Test Lab) provides a code analysis method for open source software. In addition to helpingDevelopmentEnd users can also use CTL to help prevent bad binary files.
Currently visible on GitHubSome open source information for the Red Team project.