XRATOR’s Red Team follows a proven methodology and recognized standards in the offensive security community like MITRE ATT&CK and the Cyber Kill Chain to identify weak spots in your company’s security implementation.
We start with a reconnaissance phase where we collect information about your system and your company through open source research but also by crawling the Dark Web. We also use techniques such as port scanning, service identification, and custom made XRATOR tools to find sensitive data on sharing platforms such as StackOverflow or GitHub or misconfigured Cloud platforms.
Then, we use offensive intrusion techniques to gain access to your system by bypassing security controls such as firewalls and intrusion detection systems. We may also use social engineering techniques such as phishing to obtain confidential information and impersonate a legitimate user to gain initial access to your internal network.
Once we gain access to your system, we use stealthy custom tools to capture, exfiltrate and analyze sensitive data (passwords, contracts, source code, client database, etc.) from your system. It is also possible to simulate a massive data exfiltration and encryption, as a ransomware could do.
Red Team’s tools are varied and include a mix of modified open source and proprietary software (CobaltStrike, Metasploit, SSF, etc.), social engineering techniques and physical approaches.
Social engineering techniques include spear phishing, baiting, pretexting including psychological manipulation or impersonation of a legitimate user or executive to obtain confidential information.
Physical approaches can include copying employee badges or keys, impersonating employees and falsifying identities to gain physical access to secure areas.
Using these physical, digital, and social techniques, our Red Team can simulate a real attack and thoroughly test your company’s security.