Does your company recognise and survive a real cyber attack?

Red Teaming

Red Teaming

Confidence to act in an emergency! That is the aim of a Red Teaming. We act like real attackers and attack your company. Without compromise.

Red Teamings are aimed at the fulfilment of a previously defined task. This can be, for example Leakage of certain company secrets or the Paralysing a certain Business Unit be.

The focus is therefore not necessarily on uncovering all technical vulnerabilities in the company. It is much more important to analyse the processes that are set in motion when an attack is detected. Are the measures effective? Are the defenders in a position to take the right measures?

In our view, the results of such a measure are most efficient if everything has already been done in advance to optimally protect your IT organisation. Red teaming therefore forms a complementary building block.

Essentially, it is about teaching you and your team what a real attack looks like and Your team so to empowerthis Attack in the best possible way exist.

What is the difference between a penetration test and red teaming?

A penetration test, also known as a pen test, is a check of the security of computer systems in order to uncover as many vulnerabilities and security gaps as possible in the systems and applications tested.

In contrast, red teaming refers to the simulation of attacks by a hostile or threatening scenario to test a company or organisation's capabilities and procedures in dealing with threats.

In general, red teaming is a more comprehensive approach that also considers the human component of attacks and defences, while penetration testing focuses mainly on technical vulnerabilities.

Important to know: The team of defenders (Blue Team) is not involved in the planning and preparation of red teaming, in contrast to carrying out a penetration test. An essential part of red teaming is analysing if and when an attack is detected and how the processes work after detection.

How does Red Teaming work?

A Red Teaming campaign generally consists of several phases, including

1. Pre-engagement activities

In this phase, the goals and objectives of the Red Teaming are defined, a team is put together and a plan for the implementation of the campaign is drawn up. We start with an in-depth analysis of your organisation to define clear objectives and focus areas for the Red Teaming Assessment. This enables us to understand your specific requirements and security objectives.

2. Intelligence Gathering

By identifying potential targets and gathering information about your organisation, we obtain a comprehensive picture of your infrastructure, employees and network topologies.

3. threat modelling

Based on the information collected, we develop realistic attack scenarios to test the security situation of your organisation. Our focus is on identifying vulnerabilities that could be of interest to potential attackers.

4. Weak point analysis

By actively searching, we identify vulnerabilities in your infrastructure, applications and physical security measures.

5. Exploitation

We simulate attacks to test the identification and exploitation of vulnerabilities. We use realistic methods and techniques to simulate the approach of a real attacker.

6. Post-exploitation

We review the extension of access rights to assess the effectiveness of your internal security measures.

7. Reporting and debriefing

We collect data to evaluate the success of the attacks and identify vulnerabilities that may not be immediately obvious. Once the tests are complete, we create a comprehensive report with the identified vulnerabilities, successful attack scenarios and specific recommendations for security improvements.

We will sit down with you to discuss the results, answer questions and explain our recommendations.

The phases can differ in their characteristics depending on the use case and customer.

Continuous Red Teaming

The implementation of continuous red teaming is recommended. In consultation with the commissioning organisation, different focal points can be set regularly in order to gain a comprehensive picture of safety and processes.

Focal points can be:

  • Human factor (e.g. spear phishing, vishing)
  • Open information gathering (OSINT, darknet research, password leaks)
  • Perimeter security
  • Technical safety
  • Intrusion Detection

As a rule, the commissioning organisation releases a budget for a period in which the red teaming is carried out. This means that the client does not know exactly when the attacks will take place. This allows a more realistic picture to be drawn.