?
Close
redteaming

Red teaming

Description

Red teaming is more than just classical pentesting. It is a never-ending effort to understand the current organization’s security status and to continuously improve it. In this way, we can secure business in the present and also in the future. 

Benefits

tick-bullet-large

The risk identification of attacks against important business assets and people.

tick-bullet-large

Real simulation of threat actors in a controlled environment.

tick-bullet-large

Test how the organization detects, responds, or even prevents such targeted attacks.

tick-bullet-large

Coordination with incident response and blue team to achieve maximum security posture.

What we test

Together with your IT managers, we define goals and important business assets and then simulate a real case attack, that might happen tomorrow or even today. We prepare a different range of real case scenarios, execute them and then test areas that we agreed.

Methodology

1

Threat intelligence phase

We’ll gather OSINT information from different sources.

2

Define engagement type

Based on the OSINT phase, we’ll define the type of attack and what scenarios will be used for red team engagement. We’ll prepare a schedule for engagement.

3

Attack delivery

According to the schedule, attacks will be performed. Attacks will start with small scale and going to full-blown attacks.

4

Compromise

Achieving goals will use different techniques like lateral movement, privilege escalation, C&C activities, and potential data exfiltration.

5

Reporting and analysis

After the engagement, a detailed report is prepared for customers to understand what weak points in their system and applications are, what vulnerabilities have been found, what attack vectors worked. Additional follow up with a blue team will be performed to lower risk in the future.