{"id":2876,"date":"2015-03-13T15:34:24","date_gmt":"2015-03-13T15:34:24","guid":{"rendered":"https:\/\/dn-www.azurewebsites.net\/2015\/03\/13\/what-is-red-teaming\/"},"modified":"2024-02-06T10:26:15","modified_gmt":"2024-02-06T10:26:15","slug":"what-is-red-teaming","status":"publish","type":"post","link":"https:\/\/dionach.com\/en-us\/what-is-red-teaming\/","title":{"rendered":"What is Red Teaming?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"2876\" class=\"elementor elementor-2876\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1a75b093 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1a75b093\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2e568140\" data-id=\"2e568140\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2703f001 elementor-widget elementor-widget-text-editor\" data-id=\"2703f001\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Red Team exercises can be thought of as extended penetration tests designed to thoroughly assess an organisation\u2019s security posture across multiple domains. Some security firms employ the term liberally, packaging it up and conflating it with conventional assessments; just maybe with a bit of social engineering thrown in. But \u2018old wine, new bottle\u2019 it is not. Red Team exercises, when conducted properly, are distinctive. The four main ways in which they deviate from other tests are the focus of this blog post.<\/p>\n<h3>There\u2019s no I in Red Team<\/h3>\n<p>OK, let\u2019s start with this one: Red Teams are comprised of multiple members, each with their own speciality and unique skill set. This is not to say pentesters ordinarily work in isolation, or that they don\u2019t specialise; far from it. But a Red Team engagement places a higher demand on diversity and teamwork as the group will be competing against wider, more variegated security controls. This quickly brings me to my next point\u2026<\/p>\n<h3>The Attack Surface<\/h3>\n<p>Conventional penetration tests are typically limited in scope. The sanctioned target[s] will be a web application or network segment comprised of several servers, databases and workstations. The methods by which they are tested, however, largely fall into the electronic domain. Do the exposed distributed services have the latest patches installed; are weak cipher suites supported; will carefully crafted user input force the backend database to serve up confidential information? All of these tests, and the many hundred more that are performed during a routine penetration test, can greatly aid an organisation that is looking to improve its security.<\/p>\n<p>A solid electronic defence, however, does not always equate to great security. For example, could a staff member be convinced to divulge their password to a caller posing as an external auditor? Do workers hold the door open to restricted areas out of politeness when they see someone wearing what looks like an authentic ID badge? Are the complex passwords that your IT team enforce actually scattered around the office on post-it notes under employees\u2019 desks? Attacks which harness these weaknesses occur in other domains, namely the physical and social. Red Team assessments incorporate these; attacking them with a wide range of tools, techniques and strategies.<\/p>\n<h3>Blended Attacks<\/h3>\n<p>So Red Team assessments span the electronic, social and physical domains, as well as all spaces in which they converge. This means that blended attacks are the norm in such exercises. Rather than being restricted to input validation attacks, password cracking or launching exploit code, the Red Teamer is free to phish, pick locks, scheme and manipulate in order to get the job done. Essentially, they are perfectly positioned to replicate what a highly capable and determined real-world attacker would do, but in a manner that is both controlled and sanctioned.<\/p>\n<h3>The Target<\/h3>\n<p>The final distinction that I\u2019ll note here is the difference in what is being actively targeted. In a pentest, the target is very often linked to an end system or application. Red Team assaults focus more on assets. Can intellectual property be stolen; are customer contact lists, PII and payment details adequately secured; or can an air-gapped internal network hosting other sensitive content be breached? These are the types of objectives Red Teams are assigned. Indeed, it is these that are likely to generate headlines were they to be compromised in a real-world scenario, not the particular vulnerability itself.<\/p>\n<h3>Concluding remarks<\/h3>\n<p>Chances are that if you attend a security conference this year, you\u2019ll hear the term \u2018Red Teaming\u2019 crop up more than a few times. Sometimes it will be applied appropriately, other times it may not. What is fairly concrete though is that in order to avoid being the next entry in the well-publicised and ever expanding list of companies who have fallen victim to sophisticated attackers, more will seek the services of a true Red Team. Hopefully this post has provided some clarity on what that is and how it differs from other security assessments.<\/p><p><br><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Red Team exercises can be thought of as extended penetration tests designed to thoroughly assess an organisation\u2019s security posture across multiple domains. Some security firms employ the term liberally, packaging it up and conflating it with conventional assessments; just maybe with a bit of social engineering thrown in. But \u2018old wine, new bottle\u2019 it is [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[212],"class_list":["post-2876","post","type-post","status-publish","format-standard","hentry","category-researchblog","tag-red_team","wpbf-post"],"contentshake_article_id":"","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is Red Teaming?<\/title>\n<meta name=\"description\" content=\"Red Team exercises can be thought of as extended penetration tests designed to thoroughly assess an organisation\u2019s security posture across multiple\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dionach.com\/en-us\/what-is-red-teaming\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Red Teaming?\" \/>\n<meta property=\"og:description\" content=\"Red Team exercises can be thought of as extended penetration tests designed to thoroughly assess an organisation\u2019s security posture across multiple\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dionach.com\/en-us\/what-is-red-teaming\/\" \/>\n<meta property=\"og:site_name\" content=\"Dionach\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/dionachcyber\" \/>\n<meta property=\"article:published_time\" content=\"2015-03-13T15:34:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-06T10:26:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg?fit=512%2C512&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"512\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dionach Admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@dionachcyber\" \/>\n<meta name=\"twitter:site\" content=\"@dionachcyber\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dionach Admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/dionach.com\/en-us\/what-is-red-teaming\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/dionach.com\/en-us\/what-is-red-teaming\/\"},\"author\":{\"name\":\"Dionach Admin\",\"@id\":\"https:\/\/dionach.com\/en-us\/#\/schema\/person\/e73f3537233924cf4944f7807068b3c8\"},\"headline\":\"What is Red Teaming?\",\"datePublished\":\"2015-03-13T15:34:24+00:00\",\"dateModified\":\"2024-02-06T10:26:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/dionach.com\/en-us\/what-is-red-teaming\/\"},\"wordCount\":670,\"publisher\":{\"@id\":\"https:\/\/dionach.com\/en-us\/#organization\"},\"keywords\":[\"red team\"],\"articleSection\":[\"researchblog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dionach.com\/en-us\/what-is-red-teaming\/\",\"url\":\"https:\/\/dionach.com\/en-us\/what-is-red-teaming\/\",\"name\":\"What is Red Teaming?\",\"isPartOf\":{\"@id\":\"https:\/\/dionach.com\/en-us\/#website\"},\"datePublished\":\"2015-03-13T15:34:24+00:00\",\"dateModified\":\"2024-02-06T10:26:15+00:00\",\"description\":\"Red Team exercises can be thought of as extended penetration tests designed to thoroughly assess an organisation\u2019s security posture across multiple\",\"breadcrumb\":{\"@id\":\"https:\/\/dionach.com\/en-us\/what-is-red-teaming\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dionach.com\/en-us\/what-is-red-teaming\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/dionach.com\/en-us\/what-is-red-teaming\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/dionach.com\/en-us\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is Red Teaming?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/dionach.com\/en-us\/#website\",\"url\":\"https:\/\/dionach.com\/en-us\/\",\"name\":\"Dionach\",\"description\":\"Real Security in a Virtual World\",\"publisher\":{\"@id\":\"https:\/\/dionach.com\/en-us\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/dionach.com\/en-us\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/dionach.com\/en-us\/#organization\",\"name\":\"Dionach\",\"url\":\"https:\/\/dionach.com\/en-us\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dionach.com\/en-us\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg\",\"contentUrl\":\"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg\",\"width\":512,\"height\":512,\"caption\":\"Dionach\"},\"image\":{\"@id\":\"https:\/\/dionach.com\/en-us\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/dionachcyber\",\"https:\/\/x.com\/dionachcyber\",\"https:\/\/uk.linkedin.com\/company\/dionach-ltd\",\"https:\/\/www.instagram.com\/dionachcyber\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/dionach.com\/en-us\/#\/schema\/person\/e73f3537233924cf4944f7807068b3c8\",\"name\":\"Dionach Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g\",\"caption\":\"Dionach Admin\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Red Teaming?","description":"Red Team exercises can be thought of as extended penetration tests designed to thoroughly assess an organisation\u2019s security posture across multiple","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dionach.com\/en-us\/what-is-red-teaming\/","og_locale":"en_US","og_type":"article","og_title":"What is Red Teaming?","og_description":"Red Team exercises can be thought of as extended penetration tests designed to thoroughly assess an organisation\u2019s security posture across multiple","og_url":"https:\/\/dionach.com\/en-us\/what-is-red-teaming\/","og_site_name":"Dionach","article_publisher":"https:\/\/www.facebook.com\/dionachcyber","article_published_time":"2015-03-13T15:34:24+00:00","article_modified_time":"2024-02-06T10:26:15+00:00","og_image":[{"width":512,"height":512,"url":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg?fit=512%2C512&ssl=1","type":"image\/jpeg"}],"author":"Dionach Admin","twitter_card":"summary_large_image","twitter_creator":"@dionachcyber","twitter_site":"@dionachcyber","twitter_misc":{"Written by":"Dionach Admin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/dionach.com\/en-us\/what-is-red-teaming\/#article","isPartOf":{"@id":"https:\/\/dionach.com\/en-us\/what-is-red-teaming\/"},"author":{"name":"Dionach Admin","@id":"https:\/\/dionach.com\/en-us\/#\/schema\/person\/e73f3537233924cf4944f7807068b3c8"},"headline":"What is Red Teaming?","datePublished":"2015-03-13T15:34:24+00:00","dateModified":"2024-02-06T10:26:15+00:00","mainEntityOfPage":{"@id":"https:\/\/dionach.com\/en-us\/what-is-red-teaming\/"},"wordCount":670,"publisher":{"@id":"https:\/\/dionach.com\/en-us\/#organization"},"keywords":["red team"],"articleSection":["researchblog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/dionach.com\/en-us\/what-is-red-teaming\/","url":"https:\/\/dionach.com\/en-us\/what-is-red-teaming\/","name":"What is Red Teaming?","isPartOf":{"@id":"https:\/\/dionach.com\/en-us\/#website"},"datePublished":"2015-03-13T15:34:24+00:00","dateModified":"2024-02-06T10:26:15+00:00","description":"Red Team exercises can be thought of as extended penetration tests designed to thoroughly assess an organisation\u2019s security posture across multiple","breadcrumb":{"@id":"https:\/\/dionach.com\/en-us\/what-is-red-teaming\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dionach.com\/en-us\/what-is-red-teaming\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/dionach.com\/en-us\/what-is-red-teaming\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dionach.com\/en-us\/"},{"@type":"ListItem","position":2,"name":"What is Red Teaming?"}]},{"@type":"WebSite","@id":"https:\/\/dionach.com\/en-us\/#website","url":"https:\/\/dionach.com\/en-us\/","name":"Dionach","description":"Real Security in a Virtual World","publisher":{"@id":"https:\/\/dionach.com\/en-us\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dionach.com\/en-us\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/dionach.com\/en-us\/#organization","name":"Dionach","url":"https:\/\/dionach.com\/en-us\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dionach.com\/en-us\/#\/schema\/logo\/image\/","url":"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg","contentUrl":"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg","width":512,"height":512,"caption":"Dionach"},"image":{"@id":"https:\/\/dionach.com\/en-us\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/dionachcyber","https:\/\/x.com\/dionachcyber","https:\/\/uk.linkedin.com\/company\/dionach-ltd","https:\/\/www.instagram.com\/dionachcyber\/"]},{"@type":"Person","@id":"https:\/\/dionach.com\/en-us\/#\/schema\/person\/e73f3537233924cf4944f7807068b3c8","name":"Dionach Admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g","caption":"Dionach Admin"}}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/ph4Ojq-Ko","_links":{"self":[{"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/posts\/2876","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/comments?post=2876"}],"version-history":[{"count":0,"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/posts\/2876\/revisions"}],"wp:attachment":[{"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/media?parent=2876"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/categories?post=2876"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/tags?post=2876"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}