Offensive Cybersecurity FAQs

Web Application Penetration Test

RedTeam Security will assess the level of cybersecurity awareness evident in the design of your web application. We will find and attempt to exploit security flaws that could allow privilege escalation, disclosure of sensitive information, injection of malicious code into trusted components, invalid transactions, and other conditions recognized as posing security risk.

Network Penetration Test

During the penetration test, RedTeam Security will identify the environment’s susceptibility to threats from a malicious user, third party, or malicious hacker attempting to breach systems in an attempt to gain unauthorized access to networks, operating systems, hosts, applications, and any sensitive or restricted data. This is done by leveraging a combination of expert manual testing and commercial, open-source, and proprietary software to fulfill the test objectives. An internal network pen test can be either authenticated or unauthenticated, and each provides a different level of information.

Wireless Endpoint Penetration Test

During the penetration test, RedTeam Security will identify the susceptibility of your wireless endpoint hardware and software to threats from a malicious user, third party, or malicious hacker attempting to breach systems to gain unauthorized access to other networks, sensitive data, systems compromise, and guest device exploitation. This is done by leveraging expert manual testing and open-source testing tools to fulfill the test objectives.

Social Engineering (Email & Phone)

RedTeam Security’s social engineering aims to identify risks posed to an organization related to email and phone-based social engineering attacks with the primary goal of emulating real-world phishing and other social engineering threats.

Social Engineering (Onsite)

This type of social engineering test involves our consultants being physically onsite at target locations while either overtly interacting with staff and attempting to persuade them into performing certain actions or covertly blending in to avoid being challenged.

Physical Penetration Testing

Physical penetration testing, or physical intrusion testing, will reveal real-world opportunities for bad actors (insider threat, external actors, malicious outsiders) to compromise physical security barriers in a way that may allow for unauthorized physical access to sensitive areas.

Network Vulnerability Assessment

A vulnerability assessment is a process of identifying, quantifying, and prioritizing (or ranking) the vulnerabilities of a system or systems. RedTeam Security will identify vulnerabilities within the in-scope systems, quantify their risk and prioritize them according to importance. Unlike a Penetration Test, these vulnerabilities will not be exploited.

Physical Security Operation

A physical security operation aims to measure the strength of existing physical security controls and uncover their weaknesses before bad actors can discover and exploit them. Physical security operations or physical penetration testing will reveal real-world opportunities for malicious insiders or bad actors to be able to compromise physical barriers (i.e., locks, sensors, cameras, mantraps) in such a way that allows for unauthorized physical access to sensitive areas leading up to security breaches and system/network compromise.