Red team
(Adversary simulation)

assess the impact of an attack on your organisation

Our red team engagements simulate likely real world threats, showing how it would be possible for an attacker to gain access to your organisation and demonstrate the damage they could do once inside, typically without being detected.

Test goals are typically linked to your business critical assets, such as intellectual property or production systems, and would therefore be highly impactful to your organisation if a threat was able to gain access to them. Red teaming looks beyond individual applications or infrastructure and takes a deeper approach than penetration testing, not just uncovering vulnerabilities, but showing how these could be exploited and chained together in order to achieve the set goal.

We work with organisations of all sizes, whether you require a company-wide black box test or a focussed assumed compromise approach, our red team engagements can be tailored to suit your needs and your budget, providing you with the security assurances you need.

The benefits of red team engagements

Test your
defences

Implementing security technology can be expensive, but can it truly detect a breach? We'll put your defences to the test and help you find out.

Uncover unknown vulnerabilities

Red teaming has a much broader scope than other security tests and will help you uncover a host of unknown vulnerabilities within your organisation.

Ensure your critical
assets are protected

What are your organisation’s most important assets? Intellectual property? Production systems? Financial information? Our red team engagements can provide you with the assurance that these are as protected as possible.

Simulate a
real-world threat

Our red team engagements are designed to simulate likely real-world threats, demonstrating how a threat could gain entry to your organisation and the potential consequences of them doing so.

Understand business impact & obtain buy in

Red teaming will help you fully understand the business impact of a breach and help support any request for additional security funding.

Support your security
improvement efforts

Following our engagement, we will work closely with your internal and external teams to improve your security posture, as well as your response to a breach.

The common threats we simulate

We will work with you to understand the most likely real-world threats to your organisation and simulate these faithfully. These can often include:

Ransomware

Ransomware attacks can have a huge impact, not only can they effect the day-to-day operation of your business, they could lead to reputational damage, as well as potential financial loss.

Phishing

Phishing is a common entry point for attackers. They will often attempt to coerce or deceive staff/legitimate users into clicking on a malicious link, hand over sensitive information or perform actions that may compromise your security.

Supply chain compromise

Attackers don’t have to specifically target your organisation to gain access to your sensitive material or negatively affect your operations, an unsecure supply chain could offer them a backdoor in.

Remote service exploits

Staff use a myriad of web applications and cloud services to remotely access their work environments and company information. These remote services can provide attackers with a direct route into an organisation.

Malicious insiders

Attacks don’t just come from outside threats; insiders often have access to sensitive information and if motivated, for whatever reason, they could pose a threat to your information security.

Physical breaches

Information security doesn't just happen online, your physical premises can be a potential target for attackers looking to access sensitive information.

What we test during a red team

Our consultants will look to gather information from multiple sources, utilise various techniques and attempt numerous routes in order to achieve their set goalThe routes we use are dependent on the scope set, but can include a combination of:

Technology

Your digital estate is often bigger than you think. Every connected device, website, application & server provides a potential way in. Our consultants will look to understand your estate, probing and testing to exploit potential opportunities. 

People

Staff can be your strongest line of defence, but they can also be your weakest link. Our consultants can use a variety of methods, such as social engineering and open source intelligence (OSINT), to attempt to obtain credentials and gain a foothold on your network.

Physical security

Our team are experienced in conducting physical red team operations and, if instructed, can look to manipulate their way into premises. Once inside they will attempt to gain access to sensitive areas, or confidential information unchallenged.

Process

Once inside your organisation, our security consultants will look to expose any poor security practices and controls, that when exploited will result in a security breach. Allowing them to further their attack and work towards their overall goal.

Where do we start?

Red team engagements are tailored to your needs and will look provide maximum benefit to your organisation in the allocated time. One way we can tailor our red engagements is through our starting position:

Black box approach

This mimics a real-life attack scenario, where we have basic knowledge of the organisation but have no prior access. This is typically used by clients who wish to find out how a malicious threat could gain access to the organisation from the outside.

Assumed compromise approach

This approach assumes that an attacker has somehow managed to gain a certain level of access to an organisation and is typically used by clients to fully understand what the attacker can achieve from this starting position.

Our approach to red teaming

Our approach will be unique to your organisation, your security posture, the digital estate and the goals set. Broadly speaking, each assessment will go through the following stages:  

1. Scoping & prerequisites

We will work with you to the ensure that the goals set are beneficial to your organisation, the scope of the engagement has been clearly defined, communication requirements set, and everything is in place before we start the test.

2. Testing

Our testing typically goes through the following stages: Planning > Passive reconnaissance > Active reconnaissance > Vulnerability identification > Exploit > Post-exploitation > Purple Comms.

3. Ongoing communication

We will communicate with you throughout the engagement, to your set requirements, updating you on progress and discussing potential future actions.

4. Reporting

A comprehensive test report will be delivered at the end of the assessment, providing an in-depth review of findings & a timeline of activity that took place.

5. Post-test support

We provide access to our consultants after the report has been delivered, allowing you to address specific concerns and to provide remediation advice.

6. Retest

We offer an optional period of retesting to allow you to verify issues have been mitigated successfully.

Red teaming - a Pentest case study

Could our consultants, and therefore malicious threat actors, really gain access to your organisation’s critical information?

The following case study shows, step by step, how we were able to go from web app vulnerability to domain level access during a red team engagement. 

Why choose us

Our services have been designed to thoroughly challenge your information security measures, to support your improvement efforts and ultimately, provide you with the robust security assurances needed. Assurances that your organisation, customers, suppliers and partners are as protected as possible.

Information security testing experts since 2001

We work to understand your requirements

Independent, trusted advisors

Comprehensive, quality assured reporting

Unrivalled post-test support

Contact us

Want to find out more about our red team engagements? Our team are on hand to provide you with the information and support you need. Just fill out the form below and one of our team will be in touch shortly.

Our latest research

Our Labs page is the place to discover our latest research, advisories, tool releases and challenges.

Looking to improve your security? Our insights are a great place to start.