Services

Red Team

Scenario-based penetration tests that focus more on achieving specific goals in the infrastructure than discovering all potential vulnerabilities.

Discuss your requirements

What is tested

  • Threat response, detection, and investigation processes
  • Social engineering training processes and prevention capabilities
  • Internal monitoring and detection capabilities
  • Potential compromise paths
  • Endpoint protection systems, policies, and configurations
  • Wireless configurations and employee training on dealing with wireless attacks

Our offer

  • A comprehensive framework for customer-tailored red team engagements
  • A lot of time spent on internal research
  • An established private tooling development process
  • Additional attention paid to social engineering, OSINT, or on-site activities that are usually left out-of-scope for compliance penetration tests
  • A demonstrated ability to simulate a known APT group

How we do it

During the test, a complete path is developed either from the outside networks or from initial employee-level access with no prior knowledge of the infrastructure to the internal protected segments and hosts of the network. The goal of the assessment may vary from compromising target hosts and services to sensitive data exfiltration.

TENENDO IN-HOUSE DEVELOPMENT

PRIVATE TACTICS, TECHNIQUES, AND PROCEDURES (TTPS)

Tenendo constantly upgrades its internal toolkit to stay on top of the latest tactics, techniques and procedures.

INTERNAL RESEARCH

Tenendo’s internal processes cover research for new initial access, lateral movement, escalation or persistence methods.

KNOWLEDGE BASE

The team supports a knowledge base for techniques used in previous engagements to ensure consistent success.

ON-DEMAND TTP DEVELOPMENT

Experience in offensive-specific development allows the offensive security team to emulate an arbitrary known attacker.

The Attack Lifecycle

Reconnaissance

The team conducts external reconnaissance of the target organisation and its public-facing infrastructure

Initial compromise

The offensive operations team conducts a variety of attacks ranging from social engineering to exploitation. The ultimate goal of the step is to obtain initial access to the organisation.

Persistence, escalation, and lateral movement

The team explores opportunities for expanding access and ensuring persistence.

Achieving the objective

The privileges and access obtained are leveraged to achieve the goal of the test, like exfiltration or critical infrastructure access.

Debriefing and purple teaming

After the report is written, the team conducts the debriefing and provides recommendations. If any allocated time is left, the team works with the blue team to develop new detections and mitigation strategies.

Experience and accreditations

With more than 20 years of total experience in cybersecurity and testing, our experts hold the following certifications:

Compliance and information security:

  • Certified Information Systems Auditor (CISA)
  • Cisco Certified Network Associate (CCNA)
  • ISO 27001 Lead Implementor
  • AWS Cloud Practitioner
  • Certified Cloud Security Professional (CCSP)

Test consultancy:

  • ISTQB Advanced Level Test Manager (CTAL-TM)
  • ISTQB Advanced Level Technical Test Analyst (CTAL-TTA)

Cyber security:

  • Offensive Security Certified Professional (OSCP)
  • Offensive Security macOS Researcher (OSMR)
  • Offensive Security Certified Expert3 (OSCE3):
    • Offensive Security Experienced Penetration Tester (OSEP)
    • Offensive Security Web Expert (OSWE)
    • Offensive Security Exploit Developer (OSED)
  • Certified Red Team Operator (CRTO)
  • Certified Red Team Expert (CRTE)
  • Hack the Box Red Team Operator: Level 1
  • Hack the Box Red Team Operator: Level 2
  • Hack the Box Red Team Operator: Level 3
  • Hack the Box Pro Lab BlackSky: Hailstorm
  • Cyberwarfare Labs: Certified Red Team Specialist

Your Cyber Resiliency is Our Passion

schedule a call

Post navigation