{"id":790,"date":"2023-03-22T12:44:28","date_gmt":"2023-03-22T15:44:28","guid":{"rendered":"https:\/\/www.insside.net\/\/?page_id=790"},"modified":"2023-10-26T12:47:12","modified_gmt":"2023-10-26T15:47:12","slug":"red-team","status":"publish","type":"page","link":"https:\/\/www.insside.net\/pt\/servicos\/red-team\/","title":{"rendered":"Red Team"},"content":{"rendered":"\n\t<section class=\"section servicios_intro\" id=\"section_1171722050\">\n\t\t<div class=\"bg section-bg fill bg-fill  bg-loaded\" >\n\n\t\t\t\n\t\t\t\n\t\t\t\n\n\t\t<\/div>\n\n\t\t\n\n\t\t<div class=\"section-content relative\">\n\t\t\t\n\n<div class=\"row\"  id=\"row-347674946\">\n\n\n\t<div id=\"col-2086343976\" class=\"col medium-4 small-12 large-4\"  >\n\t\t\t\t<div class=\"col-inner text-center\"  >\n\t\t\t\n\t\t\t\n\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_1813474541\">\n\t\t\t\t\t\t\t\t<div class=\"img-inner dark\" style=\"margin:-100px 0px 0px 0px;\">\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"259\" height=\"240\" src=\"https:\/\/www.insside.net\/pt\/wp-content\/uploads\/sites\/8\/2023\/02\/servicios_icon-offensive.svg\" class=\"attachment-original size-original\" alt=\"\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n<style>\n#image_1813474541 {\n  width: 80%;\n}\n<\/style>\n\t<\/div>\n\t\n\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-81299907\" class=\"col medium-8 small-12 large-8\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n\t<div id=\"text-3096189342\" class=\"text\">\n\t\t\n\n<h1>Red <span class=\"alt-font bold\" data-text-color=\"primary\">Team<\/span><\/h1>\n\t\t\n<style>\n#text-3096189342 {\n  font-size: 2rem;\n}\n<\/style>\n\t<\/div>\n\t\n<h3>Executamos servi\u00e7os de Ciberseguran\u00e7a Ofensiva com o objetivo de detectar vulnerabilidades e para detectar vulnerabilidades e explor\u00e1-las atrav\u00e9s da simula\u00e7\u00e3o de um ataque externo.<\/h3>\n\n\t<div id=\"text-2395335375\" class=\"text\">\n\t\t\n\n<p>Os escopos considerados de nossos servi\u00e7os de Ciberseguran\u00e7a Ofensiva permitem a avalia\u00e7\u00e3o de arquiteturas, infra-estrutura, aplica\u00e7\u00f5es e processos.<\/p>\n\n\t\t\n<style>\n#text-2395335375 {\n  font-size: 1.1rem;\n}\n<\/style>\n\t<\/div>\n\t\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n<\/div>\n\n\t\t<\/div>\n\n\t\t\n<style>\n#section_1171722050 {\n  padding-top: 90px;\n  padding-bottom: 90px;\n}\n#section_1171722050 .ux-shape-divider--top svg {\n  height: 150px;\n  --divider-top-width: 100%;\n}\n#section_1171722050 .ux-shape-divider--bottom svg {\n  height: 150px;\n  --divider-width: 100%;\n}\n<\/style>\n\t<\/section>\n\t\n\n\t<section class=\"section servicios_desc\" id=\"section_919748424\">\n\t\t<div class=\"bg section-bg fill bg-fill  bg-loaded\" >\n\n\t\t\t\n\t\t\t\n\t\t\t\n\n\t\t<\/div>\n\n\t\t\n\n\t\t<div class=\"section-content relative\">\n\t\t\t\n\n<div class=\"row row-large\"  id=\"row-347293604\">\n\n\n\t<div id=\"col-540591563\" class=\"col medium-4 small-12 large-4\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n\t<div id=\"text-3054772447\" class=\"text icon-item\">\n\t\t\n\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-601\" src=\"https:\/\/ip23.agenciabuffalo.com\/wp-content\/uploads\/2023\/03\/pentesting.svg\" alt=\"\" width=\"85\" height=\"50\"> Pentesting<\/h3>\n\t\t\n<style>\n#text-3054772447 {\n  color: #92e0ff;\n}\n#text-3054772447 > * {\n  color: #92e0ff;\n}\n<\/style>\n\t<\/div>\n\t\n<p>Trabalhamos em infra-estrutura, sistemas e aplica\u00e7\u00f5es web para encontrar vulnerabilidades que poderiam ser exploradas por um atacante. Tamb\u00e9m avaliamos a superf\u00edcie exposta e analisamos os ativos que poderiam ser objeto de ataque. Avaliamos e fornecemos orienta\u00e7\u00e3o sobre a\u00e7\u00f5es de mitiga\u00e7\u00e3o e remedia\u00e7\u00e3o das vulnerabilidades detectadas.<\/p>\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-1178156593\" class=\"col medium-4 small-12 large-4\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n\t<div id=\"text-3443802872\" class=\"text icon-item\">\n\t\t\n\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-600\" src=\"https:\/\/ip23.agenciabuffalo.com\/wp-content\/uploads\/2023\/03\/ethical-hacking.svg\" alt=\"\" width=\"73\" height=\"76\"> Ethical Hacking<\/h3>\n\t\t\n<style>\n#text-3443802872 {\n  color: #92e0ff;\n}\n#text-3443802872 > * {\n  color: #92e0ff;\n}\n<\/style>\n\t<\/div>\n\t\n<p>Executamos servi\u00e7os de Seguran\u00e7a Cibern\u00e9tica Ofensiva com o objetivo de detectar vulnerabilidades e explor\u00e1-las atrav\u00e9s da simula\u00e7\u00e3o de um e explor\u00e1-las atrav\u00e9s da simula\u00e7\u00e3o de um ataque externo. <br \/>Os escopos considerados nos permitem avaliar arquiteturas, infra-estrutura, aplica\u00e7\u00f5es e processos.<\/p>\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-1821408605\" class=\"col medium-4 small-12 large-4\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n\t<div id=\"text-299033083\" class=\"text icon-item\">\n\t\t\n\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-599\" src=\"https:\/\/ip23.agenciabuffalo.com\/wp-content\/uploads\/2023\/03\/ejercicios-red-team.svg\" alt=\"\" width=\"83\" height=\"74\" \/> Exerc\u00edcios<br \/>Ciberseguran\u00e7a Ofensiva <\/h3>\n\t\t\n<style>\n#text-299033083 {\n  color: #92e0ff;\n}\n#text-299033083 > * {\n  color: #92e0ff;\n}\n<\/style>\n\t<\/div>\n\t\n<p>Realizamos exerc\u00edcios de simula\u00e7\u00e3o de ataque para avaliar arquiteturas deseguran\u00e7a cibern\u00e9tica, mecanismos arquiteturas de ciber-seguran\u00e7a, detec\u00e7\u00e3o de incidentes e plataformas, processos de detec\u00e7\u00e3o de incidentes, resposta a incidentes e capacidades das equipes profissionais respons\u00e1veis pelos processosacima. Os processos acima mencionados. Dependendo dos objetivos,coordenamos com as \u00e1reas envolvidas na organiza\u00e7\u00e3o. Fornecemos feedback sobre os resultados obtidos e nossas propostas de melhoria em n\u00edvel de infra-estrutura e de processo. <\/p>\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-619372468\" class=\"col medium-4 small-12 large-4\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n\t<div id=\"text-2598838669\" class=\"text icon-item\">\n\t\t\n\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-595\" src=\"https:\/\/ip23.agenciabuffalo.com\/wp-content\/uploads\/2023\/03\/analisis.svg\" alt=\"\" width=\"84\" height=\"69\"> An\u00e1lise de Vulnerabilidade<\/h3>\n\t\t\n<style>\n#text-2598838669 {\n  color: #92e0ff;\n}\n#text-2598838669 > * {\n  color: #92e0ff;\n}\n<\/style>\n\t<\/div>\n\t\n<p>Revisamos a infra-estrutura, sistemas centrais e aplica\u00e7\u00f5es para detectar vulnerabilidades que podem ser exploradas por um atacante.\u2028Trabalhamos com base em a\u00e7\u00f5es manuais e ferramentas automatizadas que nos permitem coletar informa\u00e7\u00f5es e compar\u00e1-las com bancos de dados de vulnerabilidades.\u2028As informa\u00e7\u00f5es podem ser integradas em um servi\u00e7o gerenciado de vulnerabilidade e\/ou corre\u00e7\u00e3o de vulnerabilidades de nossa Equipe Azul.<\/p>\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-1611403668\" class=\"col medium-4 small-12 large-4\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n\t<div id=\"text-3459477311\" class=\"text icon-item\">\n\t\t\n\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-598\" src=\"https:\/\/ip23.agenciabuffalo.com\/wp-content\/uploads\/2023\/03\/cajeros.svg\" alt=\"\" width=\"72\" height=\"52\"> Ethical Hacking M\u00e1quinas de Caixas Autom\u00e1ticas<\/h3>\n\t\t\n<style>\n#text-3459477311 {\n  color: #92e0ff;\n}\n#text-3459477311 > * {\n  color: #92e0ff;\n}\n<\/style>\n\t<\/div>\n\t\n<p>Trabalhamos nos componentes f\u00edsicos e l\u00f3gicos dos caixas eletr\u00f4nicos a fim de encontrar vulnerabilidades que poderiam ser exploradas por um atacante. Analisamos a exposi\u00e7\u00e3o f\u00edsica que pode levar ao roubo, quebra e interven\u00e7\u00e3o: c\u00e2meras de v\u00eddeo, perif\u00e9ricos, sensores, localiza\u00e7\u00e3o f\u00edsica, entre outros. Complementamos com an\u00e1lise da camada l\u00f3gica, sistemas operacionais, aplica\u00e7\u00f5es, software de gerenciamento, controle de acesso, auditoria, entre outros.<\/p>\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-674027428\" class=\"col medium-4 small-12 large-4\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n\t<div id=\"text-3223212059\" class=\"text icon-item\">\n\t\t\n\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-597\" src=\"https:\/\/ip23.agenciabuffalo.com\/wp-content\/uploads\/2023\/03\/bio-facial.svg\" alt=\"\" width=\"61\" height=\"69\"> Solu\u00e7\u00f5es de teste biom\u00e9trico facial<\/h3>\n\t\t\n<style>\n#text-3223212059 {\n  color: #92e0ff;\n}\n#text-3223212059 > * {\n  color: #92e0ff;\n}\n<\/style>\n\t<\/div>\n\t\n<p>Analisamos e avaliamos a integra\u00e7\u00e3o entre aplica\u00e7\u00f5es e solu\u00e7\u00f5es biom\u00e9tricas faciais com o objetivo de detectar vulnerabilidades que poderiam levar a fraudes. Revisamos aplica\u00e7\u00f5es de valida\u00e7\u00e3o de transa\u00e7\u00f5es e embarque digital que utilizam a biometria facial como solu\u00e7\u00e3o de verifica\u00e7\u00e3o de identidade.<\/p>\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-1729131387\" class=\"col medium-4 small-12 large-4\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n\t<div id=\"text-3460253255\" class=\"text icon-item\">\n\t\t\n\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-596\" src=\"https:\/\/ip23.agenciabuffalo.com\/wp-content\/uploads\/2023\/03\/asv.svg\" alt=\"\" width=\"69\" height=\"70\"> Digitaliza\u00e7\u00f5es ASV<\/h3>\n\t\t\n<style>\n#text-3460253255 {\n  color: #92e0ff;\n}\n#text-3460253255 > * {\n  color: #92e0ff;\n}\n<\/style>\n\t<\/div>\n\t\n<p>Executamos escaneamentos de vulnerabilidade requeridos dentro da estrutura regulat\u00f3ria do PCI. Acesso \u00e0 plataforma para varreduras ilimitadas<\/p>\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n<\/div>\n\t<div id=\"gap-1609243452\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style>\n#gap-1609243452 {\n  padding-top: 30px;\n}\n<\/style>\n\t<\/div>\n\t\n\n<div class=\"row\"  id=\"row-1345523958\">\n\n\n\t<div id=\"col-1629130422\" class=\"col small-12 large-12\"  >\n\t\t\t\t<div class=\"col-inner text-center\"  >\n\t\t\t\n\t\t\t\n\n<a href=\"\/pt\/contato\/\" target=\"_self\" class=\"button secondary\"  style=\"border-radius:99px;\">\n    <span>Quero mais informa\u00e7\u00f5es<\/span>\n  <\/a>\n\n\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n<\/div>\n\n\t\t<\/div>\n\n\t\t\n<style>\n#section_919748424 {\n  padding-top: 30px;\n  padding-bottom: 30px;\n}\n#section_919748424 .ux-shape-divider--top svg {\n  height: 150px;\n  --divider-top-width: 100%;\n}\n#section_919748424 .ux-shape-divider--bottom svg {\n  height: 150px;\n  --divider-width: 100%;\n}\n<\/style>\n\t<\/section>\n\t\n\t<section class=\"section ver_servicios\" id=\"section_1859334748\">\n\t\t<div class=\"bg section-bg fill bg-fill  bg-loaded\" >\n\n\t\t\t\n\t\t\t\n\t\t\t\n\n\t\t<\/div>\n\n\t\t\n\n\t\t<div class=\"section-content relative\">\n\t\t\t\r\n\r\n<div class=\"row\"  id=\"row-1665782484\">\r\n\r\n\n\t<div id=\"col-539720324\" class=\"col small-12 large-12\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\r\n\r\n\t<div id=\"text-2053906971\" class=\"text\">\n\t\t\r\n\r\n<h2>Ver outros servi\u00e7os<\/h2>\r\n\r\n\t\t\n<style>\n#text-2053906971 {\n  text-align: center;\n}\n<\/style>\n\t<\/div>\n\t\r\n\r\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\r\n\r\n<\/div>\r\n<div class=\"row align-center\" style=\"max-width:1320px\" id=\"row-2135637176\">\r\n\r\n\n\t<div id=\"col-1406101288\" class=\"col medium-2 small-6 large-2\"  >\n\t\t\t\t<div class=\"col-inner text-center\"  >\n\t\t\t\n\t\t\t\r\n\r\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_1674160954\">\n\t\t\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"253\" height=\"242\" src=\"https:\/\/www.insside.net\/pt\/wp-content\/uploads\/sites\/8\/2023\/02\/servicios_icon-defensive.svg\" class=\"attachment-original size-original\" alt=\"\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n<style>\n#image_1674160954 {\n  width: 100%;\n}\n<\/style>\n\t<\/div>\n\t\r\n\r\n<h3>Blue<br \/><span data-text-color=\"primary\">Team<\/span><\/h3>\r\n<a href=\"\/pt\/servicos\/blue-team\/\" target=\"_self\" class=\"button secondary is-small\"  style=\"border-radius:99px;\">\n    <span>Ver +<\/span>\n  <\/a>\n\r\n\r\n\r\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\r\n\n\t<div id=\"col-1212334499\" class=\"col medium-2 small-6 large-2\"  >\n\t\t\t\t<div class=\"col-inner text-center\"  >\n\t\t\t\n\t\t\t\r\n\r\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_986669105\">\n\t\t\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"259\" height=\"240\" src=\"https:\/\/www.insside.net\/pt\/wp-content\/uploads\/sites\/8\/2023\/02\/servicios_icon-offensive.svg\" class=\"attachment-original size-original\" alt=\"\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n<style>\n#image_986669105 {\n  width: 100%;\n}\n<\/style>\n\t<\/div>\n\t\r\n\r\n<h3>Red <br \/><span data-text-color=\"primary\">Team<\/span><\/h3>\r\n<a href=\"\/pt\/servicos\/red-team\/\" target=\"_self\" class=\"button secondary is-small\"  style=\"border-radius:99px;\">\n    <span>Ver +<\/span>\n  <\/a>\n\r\n\r\n\r\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\r\n\n\t<div id=\"col-1734402223\" class=\"col medium-2 small-6 large-2\"  >\n\t\t\t\t<div class=\"col-inner text-center\"  >\n\t\t\t\n\t\t\t\r\n\r\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_722853616\">\n\t\t\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"258\" height=\"240\" src=\"https:\/\/www.insside.net\/pt\/wp-content\/uploads\/sites\/8\/2023\/02\/servicios_icon-dev.svg\" class=\"attachment-original size-original\" alt=\"\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n<style>\n#image_722853616 {\n  width: 100%;\n}\n<\/style>\n\t<\/div>\n\t\r\n\r\n<h3>Governance, Risk <span data-text-color=\"primary\">&amp; Compliance<\/span><\/h3>\r\n<a href=\"\/pt\/servicos\/grc\/\" target=\"_self\" class=\"button secondary is-small\"  style=\"border-radius:99px;\">\n    <span>Ver +<\/span>\n  <\/a>\n\r\n\r\n\r\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\r\n\n\t<div id=\"col-1013374816\" class=\"col medium-2 small-6 large-2\"  >\n\t\t\t\t<div class=\"col-inner text-center\"  >\n\t\t\t\n\t\t\t\r\n\r\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_5059244\">\n\t\t\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"207\" height=\"186\" src=\"https:\/\/www.insside.net\/pt\/wp-content\/uploads\/sites\/8\/2023\/02\/Group-233.svg\" class=\"attachment-original size-original\" alt=\"\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n<style>\n#image_5059244 {\n  width: 100%;\n}\n<\/style>\n\t<\/div>\n\t\r\n\r\n<h3>Dev <br \/><span data-text-color=\"primary\">Security<\/span><\/h3>\r\n<a href=\"\/pt\/servicos\/dev-security\/\" target=\"_self\" class=\"button secondary is-small\"  style=\"border-radius:99px;\">\n    <span>Ver +<\/span>\n  <\/a>\n\r\n\r\n\r\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\r\n\n\t<div id=\"col-773028251\" class=\"col medium-2 small-6 large-2\"  >\n\t\t\t\t<div class=\"col-inner text-center\"  >\n\t\t\t\n\t\t\t\r\n\r\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_1277123575\">\n\t\t\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"196\" height=\"187\" src=\"https:\/\/www.insside.net\/pt\/wp-content\/uploads\/sites\/8\/2023\/02\/Group-234.svg\" class=\"attachment-original size-original\" alt=\"\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n<style>\n#image_1277123575 {\n  width: 100%;\n}\n<\/style>\n\t<\/div>\n\t\r\n\r\n<h3>Identity <span data-text-color=\"primary\">Management<\/span><\/h3>\r\n<a href=\"\/pt\/servicos\/identity-management\/\" target=\"_self\" class=\"button secondary is-small\"  style=\"border-radius:99px;\">\n    <span>Ver +<\/span>\n  <\/a>\n\r\n\r\n\r\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\r\n\r\n<\/div>\r\n\r\n\t\t<\/div>\n\n\t\t\n<style>\n#section_1859334748 {\n  padding-top: 30px;\n  padding-bottom: 30px;\n}\n#section_1859334748 .ux-shape-divider--top svg {\n  height: 150px;\n  --divider-top-width: 100%;\n}\n#section_1859334748 .ux-shape-divider--bottom svg {\n  height: 150px;\n  --divider-width: 100%;\n}\n<\/style>\n\t<\/section>\n\t\n\n\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":3,"featured_media":0,"parent":209,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-transparent-header.php","meta":{"content-type":"","inline_featured_image":false,"footnotes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ciberseguran\u00e7a Ofensiva - Red Team - Ethical Hacking - Pentesting<\/title>\n<meta name=\"description\" content=\"Executamos servi\u00e7os de Ciberseguran\u00e7a Ofensiva com o objetivo de detectar vulnerabilidades e explor\u00e1-las simulando um ataque externo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.insside.net\/pt\/servicos\/red-team\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ciberseguran\u00e7a Ofensiva - Red Team - Ethical Hacking - Pentesting\" \/>\n<meta property=\"og:description\" content=\"Executamos servi\u00e7os de Ciberseguran\u00e7a Ofensiva com o objetivo de detectar vulnerabilidades e explor\u00e1-las simulando um ataque externo.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.insside.net\/pt\/servicos\/red-team\/\" \/>\n<meta property=\"og:site_name\" content=\"Insside PT\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-26T15:47:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ip23.agenciabuffalo.com\/wp-content\/uploads\/2023\/03\/pentesting.svg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.insside.net\/pt\/servicos\/red-team\/\",\"url\":\"https:\/\/www.insside.net\/pt\/servicos\/red-team\/\",\"name\":\"Ciberseguran\u00e7a Ofensiva - Red Team - Ethical Hacking - Pentesting\",\"isPartOf\":{\"@id\":\"https:\/\/www.insside.net\/pt\/#website\"},\"datePublished\":\"2023-03-22T15:44:28+00:00\",\"dateModified\":\"2023-10-26T15:47:12+00:00\",\"description\":\"Executamos servi\u00e7os de Ciberseguran\u00e7a Ofensiva com o objetivo de detectar vulnerabilidades e explor\u00e1-las simulando um ataque externo.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.insside.net\/pt\/servicos\/red-team\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.insside.net\/pt\/servicos\/red-team\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.insside.net\/pt\/servicos\/red-team\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\/\/www.insside.net\/pt\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Servi\u00e7os\",\"item\":\"https:\/\/www.insside.net\/pt\/servicos\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Red Team\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.insside.net\/pt\/#website\",\"url\":\"https:\/\/www.insside.net\/pt\/\",\"name\":\"Insside PT\",\"description\":\"L\u00edderes en Ciberseguridad\",\"publisher\":{\"@id\":\"https:\/\/www.insside.net\/pt\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.insside.net\/pt\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.insside.net\/pt\/#organization\",\"name\":\"Insside PT\",\"url\":\"https:\/\/www.insside.net\/pt\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.insside.net\/pt\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.insside.net\/pt\/wp-content\/uploads\/sites\/8\/2023\/03\/insside_logo-fav-1.png\",\"contentUrl\":\"https:\/\/www.insside.net\/pt\/wp-content\/uploads\/sites\/8\/2023\/03\/insside_logo-fav-1.png\",\"width\":77,\"height\":77,\"caption\":\"Insside PT\"},\"image\":{\"@id\":\"https:\/\/www.insside.net\/pt\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ciberseguran\u00e7a Ofensiva - Red Team - Ethical Hacking - Pentesting","description":"Executamos servi\u00e7os de Ciberseguran\u00e7a Ofensiva com o objetivo de detectar vulnerabilidades e explor\u00e1-las simulando um ataque externo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.insside.net\/pt\/servicos\/red-team\/","og_locale":"pt_BR","og_type":"article","og_title":"Ciberseguran\u00e7a Ofensiva - Red Team - Ethical Hacking - Pentesting","og_description":"Executamos servi\u00e7os de Ciberseguran\u00e7a Ofensiva com o objetivo de detectar vulnerabilidades e explor\u00e1-las simulando um ataque externo.","og_url":"https:\/\/www.insside.net\/pt\/servicos\/red-team\/","og_site_name":"Insside PT","article_modified_time":"2023-10-26T15:47:12+00:00","og_image":[{"url":"https:\/\/ip23.agenciabuffalo.com\/wp-content\/uploads\/2023\/03\/pentesting.svg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. tempo de leitura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.insside.net\/pt\/servicos\/red-team\/","url":"https:\/\/www.insside.net\/pt\/servicos\/red-team\/","name":"Ciberseguran\u00e7a Ofensiva - Red Team - Ethical Hacking - Pentesting","isPartOf":{"@id":"https:\/\/www.insside.net\/pt\/#website"},"datePublished":"2023-03-22T15:44:28+00:00","dateModified":"2023-10-26T15:47:12+00:00","description":"Executamos servi\u00e7os de Ciberseguran\u00e7a Ofensiva com o objetivo de detectar vulnerabilidades e explor\u00e1-las simulando um ataque externo.","breadcrumb":{"@id":"https:\/\/www.insside.net\/pt\/servicos\/red-team\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.insside.net\/pt\/servicos\/red-team\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.insside.net\/pt\/servicos\/red-team\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/www.insside.net\/pt\/"},{"@type":"ListItem","position":2,"name":"Servi\u00e7os","item":"https:\/\/www.insside.net\/pt\/servicos\/"},{"@type":"ListItem","position":3,"name":"Red Team"}]},{"@type":"WebSite","@id":"https:\/\/www.insside.net\/pt\/#website","url":"https:\/\/www.insside.net\/pt\/","name":"Insside PT","description":"L\u00edderes en Ciberseguridad","publisher":{"@id":"https:\/\/www.insside.net\/pt\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.insside.net\/pt\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.insside.net\/pt\/#organization","name":"Insside PT","url":"https:\/\/www.insside.net\/pt\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.insside.net\/pt\/#\/schema\/logo\/image\/","url":"https:\/\/www.insside.net\/pt\/wp-content\/uploads\/sites\/8\/2023\/03\/insside_logo-fav-1.png","contentUrl":"https:\/\/www.insside.net\/pt\/wp-content\/uploads\/sites\/8\/2023\/03\/insside_logo-fav-1.png","width":77,"height":77,"caption":"Insside PT"},"image":{"@id":"https:\/\/www.insside.net\/pt\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.insside.net\/pt\/wp-json\/wp\/v2\/pages\/790"}],"collection":[{"href":"https:\/\/www.insside.net\/pt\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.insside.net\/pt\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.insside.net\/pt\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.insside.net\/pt\/wp-json\/wp\/v2\/comments?post=790"}],"version-history":[{"count":15,"href":"https:\/\/www.insside.net\/pt\/wp-json\/wp\/v2\/pages\/790\/revisions"}],"predecessor-version":[{"id":1064,"href":"https:\/\/www.insside.net\/pt\/wp-json\/wp\/v2\/pages\/790\/revisions\/1064"}],"up":[{"embeddable":true,"href":"https:\/\/www.insside.net\/pt\/wp-json\/wp\/v2\/pages\/209"}],"wp:attachment":[{"href":"https:\/\/www.insside.net\/pt\/wp-json\/wp\/v2\/media?parent=790"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}