Operational Services
Red Team
Advanced attack simulation to test your resilience
What is a Red Team exercise?
A Red Team exercise is a realistic and advanced attack simulation against your organization. Unlike a traditional penetration test, the Red Team uses the same tactics, techniques and procedures (TTPs) as real attackers.
The goal is to assess not only your technical vulnerabilities, but especially your organization's ability to detect and respond to a sophisticated attack.
TIBER-EU / DORA TLPT
Our Red Team exercises can be conducted within the framework of TLPT (Threat-Led Penetration Testing) tests required by DORA for significant financial entities.
Red Team vs Pentest
| Aspect | Pentest | Red Team |
|---|---|---|
| Duration | 1-4 weeks | 2-6 months |
| Objective | Identify vulnerabilities | Test detection and response |
| Scope | Defined and limited | Broad, evolving |
| Knowledge | Blue Team informed | Blue Team uninformed |
| Approach | Comprehensive on scope | Realistic and targeted |
Red Team exercise process
Reconnaissance
Information gathering about your organization via OSINT, preparatory social engineering.
- •Open source intelligence (OSINT)
- •Target identification
- •Attack vector analysis
- •Pretext preparation
Initial intrusion
Initial compromise attempts through different vectors.
- •Targeted phishing (spear phishing)
- •Exposed service exploitation
- •Supply chain attacks
- •Physical compromise
Persistence & movement
Maintaining access and progressing toward objectives.
- •Persistence establishment
- •Privilege escalation
- •Lateral movement
- •Detection evasion
Objectives & exfiltration
Achieving defined objectives and demonstrating impact.
- •Sensitive data access
- •Critical system compromise
- •Exfiltration simulation
- •Business impact demonstration
Techniques used
Test your resilience
Discover how your organization would react to a sophisticated attack.
Schedule an exercise