Basilisk
BASILISK
/Nosotros/Servicios/Metodología/Sectores/Casos/FAQ
// localees
esc para cerrar▂▃▄
./contacto
[services_red_team]RED TEAM ENGAGEMENT

Full adversarial simulation. With a business goal.

While pentest seeks finding density, Red Team seeks an objective — usually business — and tests the entire defense chain along the way. We measure the blue team in a scenario as close to real as ethically possible.

What's included

The scope below is the default for a typical engagement. Everything is adjustable during scoping, at no cost.

// initial vectors
  • Targeted phishing (spear / whaling)
  • OSINT against key employees
  • Voice and messaging pretexting
  • Controlled USB drop
  • Assisted physical access (optional)
  • Leaked credential exploitation
// post-access actions
  • EDR and AV evasion
  • C2 with controlled persistence
  • Local and AD privilege escalation
  • Lateral movement and cloud pivot
  • Credential dump and kerberoasting
  • Defined objective capture (flag)

Modalities

adjustable to scope
01 /

Classic Red Team

Pure opposition. Blue team is not notified. We measure detection, containment and real response time.

02 /

Purple Team

Red and Blue cooperate in real time. Ideal to calibrate SIEM, EDR and SOC runbooks.

03 /

Assume Breach

We start already inside (simulated compromised host). Focus on containment, lateral movement and escalation.

How we conduct it

[pipeline]
01/planning

Objective & rules

We define the flag (e.g.: access to customer data). Written rules of engagement. Communication window with focal point.

02/recon

OSINT & preparation

Surface mapping, key targets and pretexting. Own infrastructure setup: C2, domains, certificates, tested payloads.

03/intrusion

Entry & persistence

Initial vector execution. Access with techniques aligned to MITRE ATT&CK. Logs maintained for operation audit.

04/objective

Objective & debrief

Flag capture under supervision. Full report + debrief with blue team: what they detected, what went through, what to prioritize.

Deliverables

dual view · NDA
01Detailed operation timeline, with time, MITRE ATT&CK action, tool and IoC.
02Detection effectiveness analysis: which actions were logged, which were missed, where response was slowest.
03Prioritized blue team improvement plan: SIEM rules, EDR policies, runbooks and specific training.
04Live debrief session with SOC, security engineering and leadership — not slides, technical conversation.
05Executive report for board with translation to financial impact and residual risk.
06Optional: iterative purple team after engagement to validate fixes in short cycles.

Frequently asked

01Difference from a pentest?

Pentest seeks density: how many flaws can I find. Red Team seeks depth: can I reach this business objective? One measures surface, the other measures defense as a whole.

02Will you try to trick my employees?

Yes, social engineering is central if in scope. We never use sensitive personal info and all material is discarded after engagement. Employees are never punished.

03Do I need to notify the blue team?

In classic Red Team, no. In Purple Team, yes. The decision is yours and depends on what you want to measure — we recommend choosing during scoping.

04What if something goes wrong during the operation?

Rules of engagement include 24/7 emergency focal point and halt keyword. Any anomaly immediately suspends the operation.

// related services
// contacto

¿Listo para descubrir tus fallas?

La primera call de scoping es gratuita y cubierta por NDA. En 48 horas recibes propuesta técnica, alcance y cronograma. Sin formularios burocráticos.