VulturSec Red Team Methodology
Red Team Assessments are highly precise assessments with the objective of compromise critical assets in our customers network, with any possible technique available.
Red Team Assessments are highly precise assessments with the objective of compromise critical assets in our customers network, with any possible technique available. Unlike a traditional penetration test, in which our team attempt to exploit any vulnerability in a before-defined scope these engagements simulate a real attack on your organization.
Using the combination of multiple types of attack techniques, we can find an attack vector to compromise any critical business assets. Discovering existing vulnerabilities in your applications, networks, IoT devices, and employees. We can also determine any flaws on your security monitoring, logging and alerting capabilities, as well as weaknesses in your incident response policies and procedures.
These assessments are used by our customers to see the big-picture on their organizations on a cyber-security level, and priorizate/plan on any future security initiatives.
1 – Scope
Red team Assessments are focused on compromise critical business assets and the scoping process defines areas to exclude from the assessment.
These are the steps followed by our team on this stage:
2 – Reconnaissance phase
Our information gathering phase combine a mix of Open Source Intelligence (OSINT) resources for gathering data on our customer organization, adding both public and private methods of intelligence gathering in order to develop an early plan of attack.
These are some activities executed during our reconnaissance:
3 – Mapping and Planning the Attack
On this stage, the process and activities executed varies deppending in our previous phases results and the information obtained on it.
Some of these activities are going to be executed:
4 – Executing Attack and Penetration
All the information gathered in previous phases are used to find any attack vectors on this phase. The following are examples of attack vectores executed:
5 – Reporting and Documentation
Each report is customized to the specific scope of the assesments and specifies any found vulnerability that our VulturSec consultants discovered. The reports are designed to be easily read, complete in the findings descriptions, provide exploitation probability, potential impact for each vulnerability and a remediation strategy for mitigating the risk associated with the vulnerability.