Coalfire’s Red Team testing provides you with the ultimate real-world test of the effectiveness of your security operations, people, processes, and technology against highly sophisticated attacks. This cyber exercise tests your organization’s defenses of layered security, security operations teams (blue team), processes and technologies by attempting to gain undetected access to sensitive data through your network -- just like an adversary would.
Advanced attackers infiltrate and devastate enterprise networks, appearing as ghosts in the machine while exfiltrating vast amounts of information. Whether you’re a government agency, defense contractor, health care provider, financial services corporation, or multi-national enterprise, you are at risk.
Coalfire Labs has developed a unique adaptive red teaming methodology that focuses on emulating the tactics, techniques and procedures (TTPs) currently employed by adversaries. This cyber exercise enables us to provide a realistic analysis of how breaches occur while providing valuable insight into the business and mission impact of network intrusions.
Our Red Team testing attempts to compromise your environment through any method possible. This includes, but is not limited to:
We exploit vulnerabilities from an external IT perspective by attempting to escalate privileges and gain unauthorized access to systems or data. Using any and all externally facing compromised systems, we’ll attempt to penetrate your perimeter and gain access to your internal systems.
Performed over the phone or in person, we exploit vulnerabilities in staff training and awareness programs by coercing employees to provide access to sensitive information that could include user credentials, sensitive business data, or network access.
Using publicly available information about your company, emails are sent to key personnel in your organization causing them to click links or open files. The links direct your employees to something as innocuous as a survey website or a site that looks exactly like your website and requests specific information. Or, the links may lead to a site that is hosting malware that is attempting to automatically compromise your systems. Files that are sent to users are written by Coalfire and contain a Trojan that only the Coalfire team can use to control and leverage the user’s computer to compromise the organization.
Leveraging the inherent weaknesses in wireless protocol, we attempt to subvert the security of wireless networks in your environment to gain access to your internal network.
Physical Social Engineering
By using in-person social engineering, or by physically subverting your security controls, we attempt to gain access to your physical network to plant devices that can be used to exploit vulnerabilities in your internal systems.
Our team may engage in one or more of the following physical techniques to gain access to your facility:
- Lock picking
- Magnetic door brute forcing
- Alarm system avoidance
- Ventilation system entrance
- False identification
- Procurement of badged access
- Access system bypass
- Video camera system redirection
Once we’ve established access to your network, we enumerate vulnerabilities on systems and within internal applications that can be exploited to achieve the testing goal. Vulnerabilities exploited could be as simple as misconfiguring file sharing, executing buffer overflows against vulnerable operating systems or services, or compromising applications.
Reporting on the Red Team Cyber Exercise
We prepare a formal report detailing all identified threats or vulnerabilities (or potential vulnerabilities), and provide recommendations for countermeasures to eliminate or mitigate these risks. This report includes assessment of the effectiveness of existing controls, risks that have been identified, security recommendations, and more.
Why Partner with Coalfire for Red Team Testing
Ensure your organization is prepared for a real-world scenario with our comprehensive approach that provides a complete picture of your environment. We bring significant experience supporting government agencies and Fortune 500 companies with comprehensive technical security assessment services.
Our Red Team exercise helps you:
- Evaluate the effectiveness your organization’s defensive security team, cybersecurity posture and responsiveness to cyber attack.
- Get valuable and actionable results including discovered vulnerabilities, potential attack paths, business impact of breaches, and remediation steps to reduce exposure.
- Understand how to immediately improve your current security posture.
Additionally, our team members are experienced in red team/blue team cyber exercises. They undergo extensive training, participate as industry thought leaders, and have earned numerous industry certifications, including GPEN, GCIH, GWAPT, CREST CCT, MCSE, RHCT, OSCP, OSCE, NSA IAM/IEM, CEH, PMP, and CISSP.