Services -Red Offering
Red Team Exercise
Red Teaming is the
simulation of a real-world and fully motivated attack
against a company, in order to test the effectiveness of its
technology, policies and people. For this reason, it
involves aspects of Social Engineering, Physical and Logical
Security, in order to gain access to pre-defined information
assets.
Our Ethical Hackers perform
the Red Team Exercise according to the following phases
summarized here:
- Planning: activities carried out alongside the customer to precisely define the objective of the exercise (flag), its duration, the perimeter (assets, processes and people), any possible exclusion.
- Information Gathering: collection of detailed information on the target, through social engineering activities, vulnerability scanning, services’ enumeration, retrieval and analysis of compromised documents relating to business targets, phishing, vishing, open source intelligence ... During this phase, it is carried out also the so-called weaponization, that is developing the most effective attack plans to achieve the goal of the assignment.
- Execution: this is the active phase of the Red Team Exercise in which ideas, tools and knowledge acquired in the previous phase are put into action, such as: sending malware; compromising servers, applications and networks; escalation of privileges and maintenance of persistence in order to exfiltrate sensitive data until the agreed target is acquired.
- Analysis and reporting: re-elaboration of all the activities carried out, the objectives achieved, the technological, procedural or human vulnerabilities found and the recommendations for remedial actions that the customer should implement.
Purple Team Exercise
For those Companies
equipped both with an internal or an external Security
Operations Center (SOC), we provide the so called Purple
Team Assessment. This represents a bridge
between Red and Blue Teams and aims to maximize the
respective and combined effectiveness of the two.
In particular, our goal is to evaluate the security team’s ability to prevent, detect and respond to cyber attacks and to coach it step-by-step on improvement techniques at each phase of the attack lifecycle itself.
In particular, our goal is to evaluate the security team’s ability to prevent, detect and respond to cyber attacks and to coach it step-by-step on improvement techniques at each phase of the attack lifecycle itself.
After a Red Team
Exercise performed by our Ethical Hackers, we analyse
together with the Customer’s SOC the collected
evidences and we cooperate in the implementation of
new detection and protection controls and rules for
immediate fine-tuning.