The red teaming activities aims to replicate the cybersecurity attack kill chain to assess the targeted organization defenses, detection mechanisms and incident response readiness. Unlike our penetration testing services, the red teaming services that Cylert offers doesn’t aim to find as many vulnerabilities as possible but rather aims to emulate real life adversary threat by bypassing defenses and detections, performing Social Engineering attacks, exploiting vulnerabilities and attempting to reach our targets.
The term kill chain was originally used as a military concept related to the structure of an attack; consisting of target identification, force dispatch to target, decision and order to attack the target, and finally the destruction of the target. Conversely, the idea of “breaking” an opponent’s kill chain is a method of defense or preemptive action. More recently, the concept was adapted to information security, using it as a method for modeling intrusions on a computer network. The cyber kill chain model has seen some adoption in the information security community.
Based on Microsoft Assume Breach Framework, we provide vantage point simulations. Given a machine on the internal network we perform red team activities attempting to escape end-point security controls, perform lateral movement and gain Domain/Forest Dominance.
Replicating the full Cyber Attack Kill Chain in attempt to breach the network, gain the highest privilege possible and acquire access to specific targets in a stealthy approach. The target is to evaluate the overall security operations and ability to detect attacks in real time.
Based on a specific scenario the engagement will attempt to test a single or multiple defense or detection solution or mechanism. This may aid our clients to define a specific weakness or test a specific solution. For Example, the scenario may focus on assessing the Security controls of the End Points or Servers.