Red Team Testing
Our Approach
Red Team Testing is designed to be an all-out attack using any weakness we find during testing. This could be leadership email addresses to be spoofed, insecure external networks, or dropping a malicious USB drive that an employee could plug into their internal device. How far we get into your IT infrastructure is all up to your organizational security, policies, and employees.
-
Reconnaissance
Information gathering of employee names and contact information, online resources, and business information
-
Phishing
Targeted phishing emails sent to your employees
-
Vishing
Targeted vishing phone calls made to your employees
-
Smishing
Targeted smishing text messages sent to your employees
-
Social Engineering
Onsite attempts to access sensitive areas of your facility or networks
-
External Pen Testing
Manual attempts to exploit external resources
-
Internal Pen Testing
Manual attempts to compromise internal networks
-
Wireless Pen Testing
Manual attempts to exploit wireless resources