Be Structured Blog Images 4

An Introduction to Penetration Testing – Part 2


In Penetration Testing 1, we examined what a Penetration Test is.  Essentially, this is when an individual or a team of individuals launch Cyber attacks in a legal and ethical manner at your lines of defense.  This is an effort to determine where all of the security weaknesses, holes, and hidden vulnerabilities lie. Penetration Testing can be done on just about anything that resides within your IT Infrastructure.

For example, your servers can be tested, as well as the Web based applications that you create.  Depending upon the magnitude of the extent of the testing, there will probably be a dedicated Penetration Testing team to address your Security concerns.

In this blog, we examine one of three types of teams that are used– The Red Team.

The Red Team

It is the Red Team that has the primary responsibility of launching an “ethical based” Cyber-attack against the defense perimeters of your business. It is important to note here that the Red Team is not particularly interested in what is being attacked, they are much more interested instead in the access methods to get to those targets.

The Red Team will use a large amount of creativity and even techniques one many never have heard of.  Remember, the goal of the Red Team is to not just attack your lines of defense, but breach them through each and every means that are available at their disposal. To do this, they will think and act just like the real Cyber attacker, but often come up with ideas on their own as well.


When a Red Team engages in its mock Cyber-attacks, they very often do not ask for a specific list of targets to hit. Rather, they are interested in those systems in your IT Infrastructure that are “out of scope”.  As a result, this gives the Red Team a much broader set of permutations to examine.  Because of this, the Red Team will “. . . find vulnerabilities that stem from cultural bias in system design, flawed conclusions, or the limitations and expectations of an insider perspective.”  (SOURCE 1)


It is important to note that Red Teams often make use of a methodology known as the “Layered Approach”.  With this, multiple attempts are utilized in order to break through the lines of defense at the business entity. These attempts are not done successively, rather they are done simultaneously, in order to cause the highest levels of confusion and mayhem for the Blue Team.

For example, one part of the Red Team may try to hack into the password database, while at the same time, another part of the Red Team could try to gain access to the main entry of the organization by using covertly replicated access cards.

It is important to note that effective Red Team Testing just does not happen over a period of 2 weeks.  It can take up to a year to examine what to hit, as a Cyber attacker these days will take their own time to determine and researche their targets.

A primary advantage of having a Red Team conduct your Penetration Testing is that they will offer an unbiased, holistic view of the weaknesses not only in your IT Infrastructure, but amongst your employees and the physical conditions of your office location(s).



Our next blog will examine the Blue Team – which are the “good guys”.



Red Teaming. (n.d.). Retrieved from


32 thoughts on “Penetration Testing – Part 2

  1. I guess what ethical cyber defense means respecting simple yet vital right Privacy. Well this is where a good IT Support comes in. I am sure that they discuss this detail at a regular basis.

  2. I’m learning alot from all your post. The best Los Angeles IT Support that you are is really not a title but you know your way around cyber world.

  3. This is a good idea! testings should be done to really determine whether or not the system can withstand hacking. There should be an external IT service to handle these tests.

  4. With the right IT support, one computer company survives longer with no damage at all. With the correct IT services, knowing your weakness will help you to work on it.

  5. A company should really look into getting the best IT Consulting especially for something as important as penetration testing. You really can’t leave things out to chance.

  6. Every company need this mock cyber attacks by professionals..Companies in los angeles can use the help of Los Angeles MSP to help find out loopholes in their security system

  7. I like how the red team focus in finding vulnerabilities that stem from cultural bias in system design. After Reading the post I can see why IT Services, has become in a need for all business.

  8. I love the “Layered Approach” discussed here. It’s amazing that this Los Angeles IT Service can get inside the head of a hacker and assess your business inside out detecting any threats. This unbiased testing is crucial for a safe and reliable network and I’m sure will help it run smoothly. Great piece. I look forward to seeing the sneak peak of the Blue Team.

  9. I think the Red Team is the best asset a computer company can have in its arsenal of fighting security flaws. Their work is absolutely vital in the testing process.

  10. Part 2 of penetration testing is finally here. Thanks so much for sharing. This is like free IT consulting 🙂

  11. Penetration testing is one of those IT services that are very instrumental in finding holes in a company’s IT infrastructure. Great job on the well researched write-up.

  12. Looks like the Red team does some very critical work in the testing process. If I was ever to go for Pen Testing I would definitely go the IT outsourcing route.

  13. Only a reputable Los Angeles MSP is capable of handling a process as intricate as Penetration Testing. Be Structured immediately comes to mind.

  14. So let me get this straight the red team are hackers??? This is one exciting and fun role playing you got here. IT Support at its best.

  15. I believe it will be a great IT service of conducting your Penetration Testing which will offer an unbiased, holistic view of the problem with a company.

  16. I love that the red team and this IT Consulting gives an ethical, in-depth perspective of your system’s weaknesses. The testing and apparatus sound very effective in the act of a real cyber attacker.

  17. A good computer company always has a plan to do a penetration test on their systems. It’s always a good testing method.

  18. Proper IT consulting will always reveal the best method to go about penetration testing. Every company is unique in its own way and no single method works for all companies.

  19. When not sure on how to do penetration testing, IT outsourcing is the best way to go. Chances should never be taken with a service as complicated as this.

  20. The Los Angeles MSP best equipped to handle penetration testing is Be Structured. They are my go to any day!

  21. I’ve been waiting for this part 2. Thank you Be Structured! You are really have the best Los Angeles IT Services.

  22. The Layered Approach was spot on. It’s amazing that this Los Angeles Computer Company can get to a hacker and assess your business searching for any threats.

  23. As much as Los Angeles IT Services is cool and all. Kinda wish that every country will have this. After all the tech age is happening all around the globe.

  24. Penetrating testing which is one IT service rendered by Be Structured should be taken as a serious thing by companies and tackled from the cause of it.

  25. A forward thinking computer company will ensure that it has a red team for its penetration testing. It’s a very effective security vulnerability probing method.

  26. An IT support structure that incorporates Penetration testing can be extremely beneficial. This is especially true if it also includes a Red Team.

  27. I think the best way to do penetration testing is by a third party through IT outsourcing. Doing it internally may make the process prone to bias.

  28. I’m of the opinion that any company looking into Penetration testing should do an extensive IT consulting before proceeding. It’s a sensitive process that needs a lot of expertise.

  29. Only a trusted Los Angeles MSP can handle the difficult task of penetration testing. Be Structured is the perfect company for this.

Leave a Reply

Your email address will not be published. Required fields are marked *