When you build your security strategy, there is no one-size-fits-all solution. The same goes for penetration testing. RedTeam Security combines industry standard methodologies with experience to provide comprehensive and thorough results for our customers, regardless of the type of engagement. A penetration test will focus on identifying security threats on your networks, web and mobile applications, IoT devices, physical facilities, human assets, or other facets of your organization. Our security team will help detect any holes in your security controls and provide remediation recommendations based on best practices to help lower the ongoing risk of future cyber attacks.
RedTeam's approach consists of about 80% manual testing and about 20% automated testing, depending on the engagement. While automated testing enables efficiency, it is limited in its ability to fully assess and identify all risks in an environment and if generally only leveraged during the initial phases of a penetration test. At RedTeam Security, it is our belief that an effective and comprehensive test can only be realized through rigorous manual pen testing techniques.
RedTeam Security's Methodologies vary somewhat based on the type of engagement (network pen testing, wireless penetration tests, physical penetration tests, social engineering or Red Team engagements) but in general, they follow the same high-level steps.
Ultimately, our penetration testers aim to simulate a real-world physical attack on the target's most prized assets without the damaging consequences of an actual attack.
Before beginning any penetration testing engagement, the pre-engagement phase begins. During the pre-engagement phase, RedTeam Security will collect details required to execute and kick off the project. This phase is crucial as it establishes the overall rules of engagement for the penetration test.
Using the information gathered for the kick-off meeting, RedTeam Security will the necessary details to ensure the penetration testing is executed efficiently, effectively and in accordance with the overall objectives.
The purpose of this step is to collectively map the in-scope environment and prepare for threat identification. Using the information collected for the kick-off meeting, RedTeam Security finalizes the necessary details for Gathering/ Open-Source Intelligence.
With most penetration testing services, the first phase is to focus on gathering as much information as possible about the target. This is done through passive reconnaissance and Open-Source Intelligence (OSINT). This is one of the most critical steps in the process because it helps to examine your organization from the perspective of a "bad guy" and enables RedTeam Security to see everything an attacker would by utilizing public tools, such as Google Earth, social media, and job boards. Using this approach, we can usually learn a great deal of information about your business, surroundings, and the environment.
By carefully examining the public side of your company, we learn helpful indicators about your organization, how it operates and uncover any sensitive information or weaknesses that might exist online.
With the information collected from the previous step, security testing transitions to identifying vulnerabilities. For network pen testing, this typically begins with automated scans initially but quickly morphs into manual testing techniques using more pointed and direct tools. During the threat-modeling step, assets are identified and categorized into threat categories. These may involve sensitive information, trade secrets, financial documents, etc.
During this phase, RedTeam Security penetration testers will:
The vulnerability analysis step involves the review, documenting and analysis of vulnerabilities discovered as a result of information gathering and threat modeling. This includes the analysis of output from the various security tools and manual testing techniques. Vulnerability Analysis will include making a plan for exploitation and gathering exploits.
Unlike a vulnerability assessment, a network penetration test takes such a test quite a bit further specifically by way of exploitation. Exploitation involves actually carrying out the vulnerability's exploit (i.e., buffer overflow) in an effort to be certain if the vulnerability is truly exploitable.
During the Exploitation phase of a penetration test, RedTeam Security's pen testers will attempt to gain access to the devices, networks, or applications through the bypassing of firewalls and other security controls and by the exploitation of vulnerabilities in order to determine their actual real-world risk. Throughout this step, we perform several manual tests simulating real-world attacks that are incapable of being performed through automated means. This phase of a RedTeam Security penetration test consists of heavy manual testing tactics and is often the most time-intensive phase.
Exploitation may include but is not limited to credential harvesting/guessing, network sniffing, leveraging known vulnerabilities in outdated software.
As part of the Exploitation phase, RedTeam Security will:
At RedTeam Security, we consider this phase to be the most important and we take great care to ensure we've communicated the value of our service and findings thoroughly. Upon completion of the assessment, RedTeam will provide an analysis of the current state of the assessed security controls. RedTeam will address comments, make necessary revisions and if requested, schedule a report presentation. The detailed contents of the deliverable are described below.
The report deliverable will include the following high-level sections in a format suitable for management:
The report deliverable will also include the following in-depth analysis and recommendations for technical staff to understand the underlying risks and remediation recommendations:
In order to perform a comprehensive real-world assessment, RedTeam Security utilizes commercial tools, internally developed tools and some of the same tools that hackers use on each and every assessment. Once again, our intent is to assess systems by simulating a real-world attack and we leverage the many tools at our disposal to effectively carry out that task.