Our hacker mindset
We use ingenious cyber experts who think like a hacker and are up to date with all the latest sophisticated threats.
The key to having the most robust security is testing your defences through the mindset of a cyber-criminal, and our ingenious red team testing experts know all the latest tricks of the trade.
We combine tactics such as physical security testing, social engineering and human manipulation to carry out a simulated real-world cyber attack targeting your people, processes and technology. We assess your defences, determine your weak spots and recommend how to strengthen your defences.
How you can benefit from red team assessment
Improved security posture after identifying and remediating weaknesses in your setup.
Safeguard your organisation’s infrastructure and critical data.
Strengthen your defences against targeted threats.
Test and improve your organisation’s resilience to cyber attacks.
Enables you to plan future investments and hiring strategies to cover the areas of greatest need.
Satisfy any regulatory compliance with quality assurance around your security systems from red teaming assessments.
30% OF BREACHES ARE CAUSED BY A COMPANY’S OWN EMPLOYEES*
86% OF BUSINESSES REPORT EXPERIENCING A PHISHING ATTACK**
98% OF ATTACKS ARE SUCCESSFUL BECAUSE OF PHISHING
95% OF BREACHES ARE CAUSED BY HUMAN ERROR
We use ingenious cyber experts who think like a hacker and are up to date with all the latest sophisticated threats.
Our industry-leading CREST-accredited team has over 20 years’ experience in the business.
Every business is different and so is our approach. We take the time to really understand your needs and then formulate the best plan to suit them.
We work across a wide range of industries and for everyone from global organisations to SMBs.
After our outcome-focused assessments, we provide a bespoke and easy-to-understand report with remediation advice and threat protection strategies.
You can rest assured in the knowledge we'll provide a holistic view of your organisation's overall security posture, leaving no stone unturned.
Scoping & reconnaissance
After we fully define the project scope, we begin reconnaissance which may include information gathering via OSINT (Open Souce Intelligence) and Physical Reconnaissance.
Planning & strategy
Now potential vulnerabilities have been identified, we formulate the best plan of attack.
Covert attack phase
Putting all your defences to the test, we work hard to obtain a foothold within your organisation, trying to take advantage of the vulnerabilities discovered earlier.
Internal recon
Lateral movement across your internal network to gain access and carry out data exfiltration.
Debriefing
Our clear and comprehensive report pinpoints how your business - the people, networks, process and applications - performed. Advice will be provided on how best to remediate and mitigate risks.
We place a payload on a USB stick and drop multiple copies around the local area. We then track whether any of these USB sticks have been picked up and plugged into a computer.
Consultants will attempt to clone the RFID access card of an employee to gain entry to secure areas.
We try to enter a secured area without appropriate access. This could be moving quickly through a barrier before it closes or encouraging an authorised person to hold the door open as we enter, perhaps, carrying a heavy box.
As well as looking for ways to enter the client’s premises without authorisation, we also report issues such as insufficient CCTV coverage, insecure locks and windows.
Similar to RFID cloning, where we try to gain covert entry into a building. Biometric Bypass involves looking for ways to bypass security on fingerprint or other biometric devices.
Using a highly targeted approach, we attempt to simulate the methods of a particular Advanced Persistent Threat Group, based on client requirements.
With a broad scope, we attempt to breach security by exploiting the employees of an organisation, trying to convince them to share passwords or sensitive information or give us unauthorised entry into a building.
A penetration test is an authorised simulated attack on networks, applications and systems with the aim of evaluating the security posture using the same tools and techniques an attacker may use.
FAQs
A penetration test is a focused form of cyber security assessment designed to identify as many vulnerabilities as possible over a short period of time, often just a few days. Pen tests are usually performed to assess specific areas such as networks and web applications.
A red team operation is an extended form of engagement conducted over a period of weeks and designed to achieve a set objective such as data exfiltration. These operations follow a black-box methodology to ensure they accurately reflect the approach of genuine attackers.
Once everything has been agreed, our typical lead time is 10 working days.
Hackers and cyber criminals target organisations of all types and sizes, so it’s vital that you conduct these exercises from time to time. Red teaming is the only way to test every layer of your security defences, including technologies, processes and people.
For maximum effectiveness, the fewer people who are aware that a test is taking place, the better. Typically, the test will be authorised by someone at C-Level or Director level within your organisation. You can read more about your employees' likely involvement here.
Unlike genuine cyber-attacks, red team operations are designed to be non-destructive and non-disruptive. By choosing a CREST-accredited provider of ethical hacking services, you can be sure that all engagements will be carried out in line with pre-agreed rules of engagement and to the highest standards.
Red teams are attack-minded, simulating how a possible hacker would attack cybersecurity defences. Blue Teams are more defence minded. They architect and maintain the protective internal cyber security infrastructure. A purple team is designed to enhance the information sharing between—and the ultimate effectiveness of—an organisation's Red and Blue teams.
Red team testing is a highly bespoke assessment and its duration may vary considerably depending on the size of the company and the attack surface they have exposed. A&O IT Group can help your company to arrive at a realistic timeline that will yield the best results and have maximum coverage.
A red team cyber security assessment will employ a variety of techniques, starting with external reconnaissance. This phase includes the enumeration of all IPs and domain names belonging to the target organisation.
Search engines and social media websites will be trawled for publicly accessible information. Once an attack surface has been identified, assessors will search for vulnerabilities in the infrastructure where public and, if applicable, bespoke Day One exploits will be used. Red Team members will attempt to gain an initial foothold.
Vulnerable external web applications are exploited, social engineering is conducted, and varying payload delivery methods occur. If within the scope of the Red Team engagement, a physical breach of premises is conducted to gain an enhanced physical foothold which provides other opportunities for cyber-attack.
Once a foothold is gained, lateral movement and privilege escalation techniques are employed. After the assessment is concluded, a detailed report with all supporting data demonstrating the attack with recommendations is supplied to you.
You can read more about the techniques used in red team testing here.
Red Teaming is advised for companies who have a mature cyber security strategy, and want to thoroughly test their defensive capabilities against scenarios that mimic how real-life attacks would occur.