Phases
The duration of the assignment depends on the scope and difficulty, but in the basics we always follow the phases below.
Scope. In the first phase, we will determine the scope in consultation with management. Where are your crucial assets located, and where will a possible hack cause the most damage to your organization.
Reconnaissance. Based on the input from the first phase, the Red Team, the attackers, determine their attack strategy, this is not fixed and the Red Team can change tactics or strategy during the attack. The choice of a strategy is closely related to the maturity level of your organization.
Teamwork. In the meantime, the Blue Team, together with employees of your IT department, will recognize irregularities and we as Blue Team work together with the employees of the organization to identify and repel the attack. In this way, the team of the organization learns how to act in the event of an attack and learns to better recognize and understand the weaknesses of the organization's network.
Results. At the end of the attack and defense cycle, we'll discuss the findings, share recommendations, and go through the results together. We do this at both a technical and management level. All findings are summarized in a clear report for both management and IT specialists.