Operational Services

Red Team

Advanced attack simulation to test your resilience

What is a Red Team exercise?

A Red Team exercise is a realistic and advanced attack simulation against your organization. Unlike a traditional penetration test, the Red Team uses the same tactics, techniques and procedures (TTPs) as real attackers.

The goal is to assess not only your technical vulnerabilities, but especially your organization's ability to detect and respond to a sophisticated attack.

TIBER-EU / DORA TLPT

Our Red Team exercises can be conducted within the framework of TLPT (Threat-Led Penetration Testing) tests required by DORA for significant financial entities.

Red Team vs Pentest

AspectPentestRed Team
Duration1-4 weeks2-6 months
ObjectiveIdentify vulnerabilitiesTest detection and response
ScopeDefined and limitedBroad, evolving
KnowledgeBlue Team informedBlue Team uninformed
ApproachComprehensive on scopeRealistic and targeted

Red Team exercise process

1

Reconnaissance

Information gathering about your organization via OSINT, preparatory social engineering.

  • Open source intelligence (OSINT)
  • Target identification
  • Attack vector analysis
  • Pretext preparation
2

Initial intrusion

Initial compromise attempts through different vectors.

  • Targeted phishing (spear phishing)
  • Exposed service exploitation
  • Supply chain attacks
  • Physical compromise
3

Persistence & movement

Maintaining access and progressing toward objectives.

  • Persistence establishment
  • Privilege escalation
  • Lateral movement
  • Detection evasion
4

Objectives & exfiltration

Achieving defined objectives and demonstrating impact.

  • Sensitive data access
  • Critical system compromise
  • Exfiltration simulation
  • Business impact demonstration

Techniques used

Spear Phishing
Vishing
Custom malware
0-day exploitation
Social Engineering
Physical Security
Wireless Attacks
Supply Chain

Test your resilience

Discover how your organization would react to a sophisticated attack.

Schedule an exercise