Assess the impact of a real-world attack on your organisation
What is a red team?
A red team engagement is designed to simulate a likely real-world threat, demonstrating if it is possible for an attacker to gain access to your organisation, evaluate the effectiveness of your defences and assess the damage that could potentially be done once inside, typically without being detected.
Testing is goal-based, and objectives are typically linked to your business-critical assets, such as intellectual property or sensitive data, and would therefore be highly impactful to your organisation if a malicious threat were to gain access to them. Red teaming looks beyond the security of an individual application or specific network infrastructure and takes a deeper approach than other types of testing, not just uncovering vulnerabilities, but showing how these could be exploited and chained together to achieve the set goal.
We work with organisations of all sizes, whether you require a company-wide assessment or a more focused assumed compromise approach. Whatever your needs, our red team service can be tailored to suit your goals and budget, providing you with the robust information security assurances you require.
Our red teaming can help:
Could an attacker really gain access to your organisation?
The following case study shows, step by step, how our consultants were able to go from a web app vulnerability to domain level access during a red team engagement.
Our red team testing
Red team engagements are tailored to your needs and will look provide maximum benefit to your organisation in the allocated time. One way we can tailor our red engagements is through our approach:
Black Box Approach
This approach mimics a real-life attack scenario, where we have basic knowledge of the organisation but have no prior access. A black box approach typically begins with a reconnaissance phase (such as open-source intelligence (OSINT) gathering) and is often used by clients who wish to find out how a malicious threat could gain access to their organisation from the outside.
Assumed Compromise Approach
This approach assumes that an attacker has managed to gain a level of access within an organisation’s network and is typically used by clients who wish to understand what an attacker could achieve from this position. The assumed compromise approach avoids the need for any lengthy reconnaissance phase and in many circumstances, can offer the better value testing for clients.
Common threats we simulate
We will work with you to understand the most likely real-world threats to your organisation and simulate these faithfully. These often include:
The routes we use during a red team
Our consultants will look to gather information from multiple sources, utilise various techniques and attempt numerous routes to achieve their set goal. The routes we use will be dependent on the scope set, but can include a combination of:
Not sure what type of testing you need?
Our team will be happy to discuss your individual requirements and provide a no obligation proposal based on your needs.
The security confidence we provide doesn’t come from a one size fits all solution.
Our red team process will be unique to your organisation, security posture, digital estate and the goals set. Broadly speaking, each assessment will go through the following stages:
Like the sound of our approach?
You can find out more about our test process and why it sets us apart.
Want to find out more about our red team engagements? Our team are on hand to provide you with the information you need. Please fill out the form below and one of our team will be in touch shortly.