is resolving...

01

The objective of a red team test is to obtain a realistic idea of the level of risk and vulnerabilities against technology, people and physical assets. Focused more on exploiting weaknesses in human nature than hardware and software.

Red teaming includes Social engineering tactics to test human susceptibility to deceitful persuasion and advanced manipulation. We perfrom, real-life assessments to evaluate prevention, detection and response capabilities.

A Red Team Operation from ScaryByte is designed to far exceed the remit of traditional security testing by rigorously challenging the effectiveness of technology, personnel and processes to detect and respond to a highly targeted attack conducted over an extended period of time.

EXAMPLES OF GOALS

EXAMPLES OF TACTICS

EXAMPLES OF TARGETS

DIFFERENCE BETWEEN PENTRATION TEST AND A RED TEAMING EXERCISE?

A penetration test is a focused form of cyber security assessment designed to identify and exploit as many vulnerabilities as possible over a short period of time, often just a few days. Penetration tests are often performed to assess specific areas such as networks and web applications.

A Red Team Operation is an extended form of engagement conducted over a period of weeks and designed to achieve a set objective such as data exfiltration, and in the process, test an organisation’s detection and response capabilities. Unlike many forms of Penetration Testing, Red Team Operations are conducted to a black-box methodology in order to ensure that engagements accurately reflect the approach of genuine attackers.

LEARN MORE

Could a red team operation cause any damage or disruption?

Unlike genuine cyber-attacks, Red Team Operations are designed to be non-destructive and non-disruptive. By choosing an experienced provider of ethical hacking services, you can be sure that all engagements will be carried out in line with pre-agreed rules of engagement and the highest technical, legal and ethical standards.

A quick Note

We urge all of our clients to consider that this type of Attack involves being physically onsite at the target location attempting to bypass physical security controls, such as: employee only entrances, receptionists, guards, cameras, motion detectors, fences, door locks, etc. Physical security testing can be overt (during business hours with possible staff interaction) or covert (typically not during business hours and not interacting with staff).

How safe is it?

Red teaming is a form of ethical hacking whereby our experts and consultants simulate the actions of a malicious hacker, utilising weaknesses in any aspect of your organization – including your network, applications, people and the physical security of your facilities. This may get certain people emotional.

02

automated security audits

External Vulnerability Scanning

Our scanners are connected to trusted and popular (public and private) vulnerability databases and security communities. Our SPBA (Smart Proof-Based Analysis) algorithm automates multiple safe and read-only exploits to identify false positives so there is no chance of corrupting data or disrupting any targeted service.

Small Business

R4999.99

per month
  • 1x Web Application Scan
  • 1x Network Scan
  • 2x Detailed Reports
  • 12x Months SLA
  • -
  • -
Subscribe Now

Medium Business

R8999.99

per month
  • 2x Web Application Scans
  • 2x Network Scans
  • 4x Detailed Reports
  • Support
  • White Labeled
  • 12x Months SLA
Subscribe Now

Large Business

R----.--

per month
  • 3+ Web Application Scans
  • 3+ Network Scans
  • 6+ Detailed Reports
  • Support
  • White Labeled
  • 12x Months SLA
Sales Team