Wrap-up and conclusion
At the end of the attack simulation, you will receive a detailed report on the attacks carried out and the vulnerabilities exploited. Finally, in a presentation of the results, questions can be clarified and lessons learned can be discussed together with the Blue Team.
Before you can finally implement the newly gained insights, the last step of the attack simulation is the so-called “house cleaning”. In this process, you should remove the user accounts, configurations, etc. that we created during the attack simulation and reset the network to its original state.