Red Team consists of conducting precision attacks against an organization in order to test the effectiveness and responsiveness of different parts of a security program.

Traditional penetration testing often excludes some of the avenues of attack and tactics that real attackers or threat communities are currently using in the wild.

Unlike traditional testing, an Adversarial Attack Simulation takes an integrated approach to assess your information security defenses by combining multiple testing strategies into a comprehensive offensive engagement, with the sole objective of gaining access to customer assets.

Adversarial Attack Simulation can include:

  • Spear-Phishing
  • Specialized Malware
  • Open Source Reconnaissance
  • Social Engineering
  • Targeted Web Application Attacks
  • Physical Security Attacks
  • Wireless Attacks

TrustedSec’s Adversarial Attack Simulation is comprised of the following engagement phases and components, customized to meet your security objectives:

  • Reconnaissance
  • Threat modeling
  • Attack planning
  • Electronic and physical perimeter testing
  • Exploitation and post-exploitation
  • Key findings and recommendations

Featured Content

Research + Red Team + Risk Management: Assessing Evolving Threats


Talk with an Expert

David Kennedy

Author: David Kennedy

Security expert, keynote speaker, avid gamer and the go-to for protecting companies from threats.