Red teaming work is a type of ethical hacking in which security experts emulate the tactics, techniques and procedures (TTPs) of real attackers.
Ethical hackers have the same skills and use the same tools as malicious hackers, but their goal is to improve network security. Red team members and other ethical hackers follow a strict code of conduct. They get permission from organizations before hacking them, and they don’t do any real harm to a network or its users.
Instead, red teams use attack simulations to understand how malicious hackers can cause real damage to a system. During a read teaming exercise, the red team members behave as if they are real-world adversaries. They leverage various hacking methodologies, threat emulation tools and other tactics to mimic sophisticated attackers and advanced persistent threats.
These simulated attacks help determine how well an organization’s risk management systems—people, processes and technologies—might resist and respond to different types of cyberattacks.
Red team exercises are usually time-bound. A test might last anywhere from a few weeks to a month or more. Each test typically begins with research of the target system, including public information, open-source intelligence and active reconnaissance.
Next, the red team launches simulated attacks against various points in the system’s attack surface, exploring different attack vectors. Common targets include:
During these simulated attacks, red teams often face off against blue teams, who act as the system’s defenders. The red teams try to get around the blue team’s defenses, noting how they do so. The red team also records any vulnerabilities that it finds and what it can do with them.
Red teaming exercises end with a final readout, where the red team meets with the IT and security teams to share its findings and make recommendations on vulnerability remediation.