Our red team assessment is our most sophisticated attack simulation service offering. Our Red Team service combines the most nefarious tactics, techniques, and procedures from our open-source intelligence gathering, social engineering and penetration testing offerings into a multi-pronged attack that closely mimics a sophisticated adversarial assault.
No two red team assessments are the same. Our team of certified professionals will collaborate with your authorized personnel to define complex pretext(s) that best set the stage for assessing key components of your organization’s security program.
We honor all requests (within reason) and brainstorm possible approaches if you would prefer direction when initiating the planning process. Maintaining the appearance of validity, authenticity and security in everything we do is the cornerstone of believable and successful engagements. We leverage every feasible possibility to develop the most realistic attack for the desired approach and circumstances.
These completely customizable assessments leverage manual processes. Skilled attackers do not use well-known tools with easily detectable payloads to execute these types of attacks, and neither do we.
Our expert consultants are adept at developing custom “malware,” evading technical controls, creating doppelgänger websites, circumventing physical security controls, exploiting trust and emotions via email, voice, and in-person interactions, and covertly identifying the path of least resistance to your organization’s assets.
While the following list includes examples of specific activities that we include in red teaming assessments, we will work closely with you to identify the approach(es) and technique(s) that are the most viable for your objectives.
The specific techniques involved in the engagement include, but are not limited to:
Certifications