Red Teaming (RT)
Red teaming is a simulated attack to a digital infrastructure that is carried out on many levels. Its main objective is to assess the security level of the infrastructure and to identify potential vulnerabilities in it.
Taking inspiration from how a real adversary would act, the Red Team simulates a fake attack that takes advantage of every people, processes, and technologies weakness, aiming at understanding the actual risk the company is subject to.
The attack can be:
- Technological – through a network violation
- Human – through social engineering
- Physical – by accessing to buildings or company properties
Network Penetration Test (NPT)
A Network Penetration Test assesses the security level of networks, hosts and devices by identifying known and unknown vulnerabilities which might threaten the company business the most.
NPT can be run:
- from the inside (internal NPT): the test is run from the inside of the company network, simulating an internal malicious actor (i.e. a consultant, an employee).
- from the outside (external NPT): the test is run against the company external exposure, simulating an external malicious actor.
- with a White-Box approach: the penetration tester has all the information about the network, credentials for different roles and support from the customer’s SOC/NOC.
- with a Black-Box approach: the penetration tester only knows the in-scope targets and needs to figure out his way through the network.
What's the difference between RT and NPT?
Even though Network Penetration Test and Red Teaming might have some stages in common, it is important to underline that they represent two different kinds of assessment. While the former allows identifying vulnerabilities in an IT system, the latter gives specific information about how an adversary could compromise the company.
We have Golden Tickets in Domain Controllers of