Red Team
An unrestricted attack simulation, as close to reality as it gets.
Red Team engagements give our experts complete freedom of action to compromise all or part of your infrastructure. The objective: replicate the behaviour of a real attacker and measure your detection and response capabilities.
Red Team vs Pentest
What's different
Unlike a standard penetration test with a fixed scope, a Red Team engagement is open-ended: our experts combine all available techniques to achieve a defined objective — just like a real attacker.
Open scope
No attack surface restrictions. Any realistic vector is in play: web, network, physical, social engineering.
Impact-driven objective
The engagement targets a concrete outcome: access to sensitive data, compromise of a critical system, or full domain takeover.
Detection & response testing
Your Blue Team and SOC are tested under real conditions, without prior warning.
Example scenario
From a web flaw to full domain compromise
This scenario illustrates a realistic attack chain carried out during a Red Team engagement. Each step builds on the previous to advance toward the final objective.
Exploitation of a vulnerability on a web server (e.g. WordPress plugin)
Setting up a relay from the compromised server to the internal network
Internal network mapping, identification of priority targets
Exploitation of an internal vulnerability (e.g. EternalBlue) on a server
Access token theft and escalation to administrator rights
Domain takeover and credentials database extraction
Retrieval of the client's confidential data
Terms of engagement
Red Team engagement
Duration and scope defined jointly. Stealthy approach, without alerting internal teams in advance.
Detailed report
Attack timeline, exploited vulnerabilities, evidence and countermeasures to adopt.
Client debrief
Full debrief with your technical and executive teams to build the remediation plan.
Training (optional)
Awareness and training for teams on the cyber threats observed during the engagement.
Frequently asked questions
Red Team: what you need to know
What is the difference between a Red Team engagement and a pentest?
A pentest is scoped in time and perimeter: a specific system is tested against a defined brief. A Red Team engagement is open-scope: operators use every available vector (web, network, physical, social engineering) to reach a defined objective with no perimeter constraint. It measures the organisation's real-world detection and response capabilities.
How long does a Red Team engagement last?
A Red Team engagement typically lasts 4 to 12 weeks, depending on infrastructure complexity and defined objectives. Scope, rules of engagement and duration are agreed upon together before the engagement begins.
Who is Red Team suitable for?
Red Team engagements are suited for organisations that have already conducted several pentests and want to test their detection and incident response capabilities under real conditions — with no prior warning to the internal team. They are particularly well-suited for organisations with a SOC or in-house Blue Team.
How much does a Red Team engagement cost?
The cost of a Red Team engagement depends on the duration, scope and objectives defined together. Engagements typically span 3 to 8 weeks of mobilisation. We provide a tailored quote after an initial call to qualify your context and challenges.
Test your resilience under real conditions.
Our Red Team experts define engagement objectives and rules of engagement with you.