Service

Red Team
Engagement

> covenant --bind 443 --generate https --payload PowerShell_

A penetration test tells you where your walls are weak. A red team engagement tells you whether anyone would notice if someone climbed over them. We simulate the full attack lifecycle — from phishing email to data exfiltration — to test your people, processes, and technology as one integrated defence.

The question isn't can they get in. It's would you know?

Most organisations spend their security budget building walls. Firewalls, endpoint protection, email gateways, identity management — layer upon layer of defence. And that's sensible. But here's the question nobody wants to ask: if someone got through all of those layers, how long would it take you to notice?

The industry average dwell time — the gap between an attacker gaining access and being detected — is 204 days. That's nearly seven months of an attacker moving freely through your environment, reading your emails, exfiltrating your data, and mapping your network. Every one of those days costs money, reputation, and trust.

A red team engagement answers the most important question in security: does your defence actually work as a system? Not in theory, not on paper, not in a compliance audit — but in practice, against a motivated, creative adversary using the same techniques as nation-state actors and organised crime groups.

The Real Cost of Not Knowing

Consider the asymmetry: a red team engagement costs a defined, predictable amount. The alternative — discovering your detection capabilities are inadequate during a real attack — costs orders of magnitude more. The organisations that commission red team engagements aren't paranoid. They're the ones who understand that confidence without evidence is just optimism, and optimism isn't a security strategy.


Same family, different species.

People often confuse penetration testing with red teaming. They're related — both involve simulated attacks — but they answer fundamentally different questions. Understanding the difference helps you choose the right engagement for your objectives.

Dimension Penetration Test Red Team Engagement
Objective Find as many vulnerabilities as possible within a defined scope. Achieve specific goals (e.g., access the CEO's email, exfiltrate customer data) while testing detection and response.
Scope Defined and constrained — specific systems, applications, or network ranges. Broad and realistic — the entire organisation is in scope, including people and physical security.
Awareness IT and security teams are fully aware testing is happening. Only senior leadership knows. The SOC, IT, and security teams are deliberately kept unaware to test real response.
Stealth Not a priority. Speed and thoroughness matter more than avoiding detection. Critical. The red team actively evades detection, mimicking the behaviour of a real advanced threat.
Duration Days to weeks. Weeks to months — allowing time for realistic attack progression.
Techniques Technical exploitation of systems and applications. Full spectrum — phishing, social engineering, physical access, technical exploitation, and custom tooling.
Primary Value Vulnerability discovery and remediation guidance. Validation of detection capabilities, incident response effectiveness, and overall security posture.

Which Do You Need?

If you haven't had a penetration test recently, start there. Red teaming is most valuable for organisations that have already invested in security controls and want to validate whether those controls work as a system under realistic conditions. Think of it as the final exam — you should have done the coursework first.


The full attack lifecycle.

A red team engagement mirrors the complete kill chain of a sophisticated threat actor. We don't just find a way in — we establish persistence, move laterally, escalate privileges, and work towards specific objectives, just as a real adversary would.

Initial Access
Targeted phishing campaigns, spear-phishing with custom pretexts, watering hole attacks, credential stuffing from leaked databases, exploitation of internet-facing services, and physical access attempts. We use whichever entry point gives us the best chance — just like a real attacker would.
Persistence
Scheduled tasks, registry modifications, DLL hijacking, service creation, startup folder abuse, and implant deployment. Once we're in, we establish multiple persistence mechanisms to survive reboots, password changes, and endpoint security scans — testing whether your SOC detects any of it.
Lateral Movement
Pass-the-hash, pass-the-ticket, RDP pivoting, WMI execution, PSExec, SSH tunnelling, and exploitation of trust relationships. We move through your network the way an APT would — slowly, deliberately, and quietly — testing whether network monitoring and segmentation catch us.
Data Exfiltration
DNS tunnelling, HTTPS exfiltration, encrypted archive upload, steganography, and cloud storage abuse. We simulate the extraction of sensitive data using the same techniques real threat actors use to steal intellectual property, customer data, and financial records — testing your DLP and monitoring capabilities.
Command & Control (C2)
Custom C2 infrastructure using domain fronting, legitimate cloud services, encrypted channels, and malleable C2 profiles designed to blend with your normal network traffic. We test whether your network monitoring can distinguish our traffic from legitimate business communications.
Privilege Escalation
Local and domain privilege escalation through Kerberoasting, AD delegation abuse, token impersonation, unquoted service paths, and credential harvesting from memory. Our goal: demonstrate the path from initial foothold to domain dominance — and document every step your defences missed.

MITRE ATT&CK mapped.

Every technique we use is mapped to the MITRE ATT&CK framework — the industry-standard knowledge base of adversary tactics and techniques. This gives you a clear, structured understanding of exactly what was simulated, what was detected, and what was missed.

MITRE ATT&CK Phases
TA0001 Initial Access # Phishing, exploit public-facing application
TA0002 Execution # PowerShell, command line, scripting
TA0003 Persistence # Scheduled tasks, registry run keys, implants
TA0004 Privilege Escalation # Token manipulation, AD exploitation
TA0005 Defence Evasion # Obfuscation, AMSI bypass, LOLBins
TA0006 Credential Access # Kerberoasting, credential dumping, keylogging
TA0007 Discovery # Network scanning, AD enumeration, share discovery
TA0008 Lateral Movement # Pass-the-hash, RDP, WMI, PSExec
TA0009 Collection # Data staging, email collection, screen capture
TA0010 Exfiltration # DNS tunnelling, HTTPS, cloud storage
TA0011 Command & Control # Domain fronting, encrypted channels, C2 profiles

Engagement structure

Red team engagements follow a carefully planned structure to maximise value while maintaining safety:

Phase 1

Planning & Rules of Engagement

We work with senior leadership to define objectives, establish rules of engagement, set up emergency communication channels, and agree on scope boundaries. This ensures the engagement is realistic but safe, with clear guardrails.

Phase 2

Reconnaissance & Targeting

Extensive OSINT gathering — social media, job postings, leaked credentials, technology fingerprinting, organisational structure mapping. We build a comprehensive picture of your organisation to identify the most promising attack vectors.

Phase 3

Attack Execution

The main engagement. We execute our attack plan — gaining initial access, establishing persistence, moving laterally, and working towards the agreed objectives. Every action is logged and timestamped for the final report.

Phase 4

Reporting & Purple Team Debrief

A comprehensive report mapping every action to MITRE ATT&CK, with a detection gap analysis showing what was caught and what was missed. We then run a purple team session — replaying our attacks with your defensive team watching — to close every gap together.


Detection is a muscle. Use it or lose it.

A red team engagement dramatically improves your detection capabilities — but only if you maintain them. New attack techniques emerge constantly. Staff turnover erodes institutional knowledge. Alert fatigue creeps in.

For continuous threat detection and incident response, see our SOCinaBox managed SOC service. Let our analysts be the 24/7 eyes on your network, ensuring the detection improvements from your red team engagement don't fade over time.

The Virtuous Cycle

Red team → fix detection gaps → SOCinaBox monitors continuously → red team again next year → find fewer gaps. Each cycle makes your organisation measurably harder to compromise. That's not a cost — it's a compounding investment in resilience.


Explore more.


Would you know if someone was already inside?

The most dangerous assumption in security is that your defences work because they've never been tested. Let us test them — properly. Every engagement starts with a confidential scoping conversation. No obligation, no pressure, no judgement.