RED TEAM operations

Beyond cyber security. Beyond pentests.

About REDYops

Red teaming is the next step in security. Evaluate the overall security of your organization and discover how well you can defend from sophisticated attacks combining targets such as People, Technology and Physical Security.

Red Team provides the following:

Physical SecurityAssess Physical Security
penetration testAssess technology
APTAssess humans
Implant spy devicesImplant spy devices
Zero days exploits0-day exploits research
RED vs BlueEvaluate Blue Team
Assess security proceduresAssess security procedures

When PenTest is not enough

A Red Team will attack and exploit every possible entry point using advanced exploitation tactics, advanced Social Engineering attacks and physical security attacks. Our team simulates an Advanced Persistent Threat (APT) which targets your organization whilst using in-house malware/0-day exploits.

Our team will attempt to compromise the overall security controls by actively attacking an entity and using every possible “ethical” way, based on scenarios that your Organisation wishes to test. Specific targets/goals and achievements can be determined such as stealing sensitive documents or corporate secrets.

All areas of interest are tested

    • Assess your physical security controls in offices, warehouses and buildings. Spot any weak entry points and ways that intruders can use to access your Organisation.
    • Assess your security procedures and your staff/departments readiness against Social Engineering attacks (both physical and electronic). See how Advanced Persisted Threat – APT phishing attacks against your staff can harm your Organisation.
    • Assess your organization’s networks, applications and appliances and identify any vulnerabilities. Go beyond known vulnerabilities through extensive vulnerability research and discovery of 0- day exploits.

More Attack paths and real scenarios

Physical
  • Lock picking
  • Dumpster diving
  • Blind spots
  • Covert Observation
  • Access into buildings/locations
  • Hostile device placement
People
  • Social Engineering
  • Pretexting
  • Vishing
  • SMiShing
  • Spear phishing
  • Piggybacking
Technology
  • Advanced Exploitation
  • RFID/Card cloning
  • Unique Malware
  • Intelligence Gathering - OSINT
  • Remote access hostile devices

Who we are

A team of highly qualified professionals with:

  • Advanced penetration skills and ethical profile
  • Internationally recognised professional certifications
  • Years of proven experience in the field
  • Advanced attacking skills on different aspects of security

A certified team

OSCP OSCE OSWP CEH eMAPT eWPT