Skip to content

Commit

Permalink
typo
Browse files Browse the repository at this point in the history
  • Loading branch information
jintrusions committed Oct 19, 2023
1 parent e45e7bc commit a91ff89
Show file tree
Hide file tree
Showing 2 changed files with 2 additions and 2 deletions.
2 changes: 1 addition & 1 deletion service/dev/dev/index.html
Original file line number Diff line number Diff line change
Expand Up @@ -103,7 +103,7 @@ <h2>Software Development</h2>
<p><strong>Custom Red Team tooling.</strong> We can design or implement your design for command and control (C2), payload servers, obfuscators, launchers, etc. Services are available in C, C++, Golang, Python, and others upon request. We can also build Red Team infrastructure using ansible and CloudFormation or terraform.</p>
</li>
<li>
<p><strong>Defensive integrations.</strong> If you&rsquo;ve invested in SOAR, EDR, or XDR and have workflows or playbooks you&rsquo;d like to automate, we can write the code for you. Reduce repetative tasks through automating activities like triage, and various incident analysis. If it has an API, we can work with it and build integrations between your tools to automate investigations, response, and other security tasks. We&rsquo;ll help your infosec team&rsquo;s efficiency so they can work smarter.</p>
<p><strong>Defensive integrations.</strong> If you&rsquo;ve invested in SOAR, EDR, or XDR and have workflows or playbooks you&rsquo;d like to automate, we can write the code for you. Reduce repetitive tasks through automating activities like triage, and various incident analysis. If it has an API, we can work with it and build integrations between your tools to automate investigations, response, and other security tasks. We&rsquo;ll help your infosec team&rsquo;s efficiency so they can work smarter.</p>
</li>
<li>
<p><strong>AWS Development.</strong> We can implement security controls in your existing IaC code base including CloudFormation or terraform. We can create code from scratch, or introduce hardening and security best practices into your existing code base.</p>
Expand Down
2 changes: 1 addition & 1 deletion service/redteam/rt/index.html
Original file line number Diff line number Diff line change
Expand Up @@ -100,7 +100,7 @@ <h2>Red Team</h2>
<p><strong>Red Teaming provides real-world validation of your defensive technical controls, detection capabilities, and IR processes.</strong></p>
<p>You&rsquo;ve invested substantial time and money in endpoint protection, patch management, firewalls, vulnerability scanning, SIEM, 24x7 monitoring, have a threat hunting program, and authored incident response playbooks, but how do you know its all working as designed? Red Teaming is the ultimate quality assurance test of your whole defensive program.</p>
<blockquote>
<p><em><strong>A Red Team exercise provides technical and non-technical leadership alike answers to the important question &ldquo;How would we fare against a targeted cyber attack and are our defensive investments working?"</strong></em></p>
<p><em><strong>A Red Team exercise provides technical and non-technical leadership alike answers to the important question &ldquo;How would we fare against a targeted attack and are our defensive investments working?"</strong></em></p>
</blockquote>
<p>Our Red Team engagements are covert, intended to evade or deceive detection mechanisms. Engagements typically last 8-12 weeks to allow time for covertness, detailed reconnaissance, payload development, and social engineering plot development and execution, and in some cases, travel. Significant effort is spent discovering the target defensive technologies and preparing attacks to escape discovered defenses in a lab environment.</p>
<p>Our team are all students of public Advanced Persistent Threat (APT) reports and pursue learning what intelligence agencies and criminal gangs are using in order to re-purpose these techniques for our clients.</p>
Expand Down

0 comments on commit a91ff89

Please sign in to comment.