Adversary Simulation identifies holes in your network before the bad guys find them.
Our CREST Registered Red Team launch real-world attacks against your organisation, testing response capabilities before a real-world attack occurs.
Initial Assessment
Challenge our Red Team to gain access to your environment using all the tools and tricks they have available to them. Leverage our expertise to test your response processes and ensure appropriate controls are in place on an annual basis. No holds barred adversary simulation utilising the latest attack techniques aligned with the Cyber Kill Chain.
-
-
Mass Phishing
-
-
Spear Phishing
-
-
Physical Entry
-
-
USB Dead-drops
-
-
Wireless Network Attacks
-
-
Dropboxes
-
-
Floor Walks
-
-
Executive Impersonation
Ongoing Assessments
Our one of a kind engagement provides ongoing assessments of your network defences and response processes. Through deployment of an agent onto all machines, the DefenceShield Red Team run multiple attack simulations based on the MITRE ATT&CK Framework with the goal to gain access to credentials and steal sensitive data without detection.