In a red teaming the detection and response measures are also examined. Just like a real attacker, we work as unobtrusively as possible, so that the Blue team (the SOC analysts), without their knowledge, are challenged to detect an attack in their network.
Unlike a penetration test, the goal of a red teaming is not to expose as many vulnerabilities as possible. Instead, this method aims to verify that the total set of security measures in place provides adequate protection against a real attacker.
Our hackers will try to stay in your network for a longer period of time. Under the radar, they acquire rights in your systems and information about your crown jewels. When they have all the pieces of the puzzle in place, so-called Actions on objectives are carried out: malicious actions that demonstrate the impact of the attack.