{"id":2629,"date":"2024-10-22T15:22:32","date_gmt":"2024-10-22T15:22:32","guid":{"rendered":"https:\/\/www.hackmosphere.fr\/red-team\/"},"modified":"2025-06-06T12:25:05","modified_gmt":"2025-06-06T12:25:05","slug":"red-team","status":"publish","type":"page","link":"https:\/\/www.hackmosphere.fr\/en\/red-team\/","title":{"rendered":"Red Team"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; next_background_color=&#8221;#ffffff&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_direction=&#8221;137deg&#8221; background_color_gradient_stops=&#8221;#1a1a31 0%|#0b4650 100%&#8221; background_image=&#8221;https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2024\/10\/PATTERN-HEADER.png&#8221; background_position=&#8221;top_left&#8221; background_horizontal_offset=&#8221;100%&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;8vw||8vw||false|false&#8221; custom_padding_tablet=&#8221;15vw||15vw||true|false&#8221; custom_padding_phone=&#8221;20vw||20vw||true|false&#8221; bottom_divider_style=&#8221;asymmetric&#8221; background_last_edited=&#8221;on|phone&#8221; background_enable_image_phone=&#8221;off&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;c4d64208-0f63-40a8-bbdd-efdc4f45c38b&#8221; header_text_color=&#8221;#FCFCFC&#8221; custom_margin=&#8221;||||false|false&#8221; header_2_text_align_tablet=&#8221;center&#8221; header_2_text_align_phone=&#8221;left&#8221; header_2_text_align_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>RED TEAM<\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;04aefc12-0bc2-42e3-86c5-dd2d05a7cf91&#8243; header_2_text_color=&#8221;#FCFCFC&#8221; width=&#8221;51%&#8221; width_tablet=&#8221;100%&#8221; width_phone=&#8221;100%&#8221; width_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>See your organization through the eyes of an experienced attacker<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;c170891f-9edb-4d5a-8298-f6c4e317d5cd&#8221; width=&#8221;77%&#8221; width_tablet=&#8221;100%&#8221; width_phone=&#8221;100%&#8221; width_last_edited=&#8221;on|tablet&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\">With our Red Team exercise, simulate a sophisticated attack to assess the resilience of your systems, employees and infrastructure.<\/p>\n<p style=\"text-align: justify;\">Discover potential vulnerabilities and assess your ability to detect advanced attacks.<\/p>\n<p style=\"text-align: justify;\">Strengthen your defenses to better anticipate real threats.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE3ODAiLCJlbmFibGVfaHRtbCI6Im9mZiJ9fQ==@&#8221; button_text=&#8221;Request a quote&#8221; admin_label=&#8221;row&#8221; _builder_version=&#8221;4.25.1&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;16px&#8221; button_text_color=&#8221;#1A1A31&#8243; button_bg_color=&#8221;#01DC94&#8243; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;12px&#8221; button_font=&#8221;Inter||||||||&#8221; button_icon=&#8221;&#x24;||divi||400&#8243; button_icon_color=&#8221;#1A1A31&#8243; button_on_hover=&#8221;off&#8221; custom_padding=&#8221;10px|50px|10px|30px|true|false&#8221; global_module=&#8221;2077&#8243; saved_tabs=&#8221;all&#8221; global_colors_info=&#8221;{}&#8221; button_bg_color__hover_enabled=&#8221;on|hover&#8221; button_bg_color__hover=&#8221;#B7F7CC&#8221; button_bg_enable_color__hover=&#8221;on&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; custom_padding_tablet=&#8221;&#8221; custom_padding_phone=&#8221;20px||20px||true|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;74f91c42-4ba7-4cbe-881f-bf82609ea1e5&#8243; header_3_text_align=&#8221;center&#8221; header_3_text_color=&#8221;#1A1A31&#8243; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||10px||false|false&#8221; header_3_text_align_tablet=&#8221;left&#8221; header_3_text_align_phone=&#8221;left&#8221; header_3_text_align_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3><span style=\"font-weight: 400;\">Simulate a full Red Team attack to test your defenses<br \/><\/span><\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;c170891f-9edb-4d5a-8298-f6c4e317d5cd&#8221; text_text_color=&#8221;#1A1A31&#8243; text_orientation=&#8221;center&#8221; width=&#8221;78%&#8221; width_tablet=&#8221;&#8221; width_phone=&#8221;100%&#8221; width_last_edited=&#8221;on|tablet&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||||false|false&#8221; text_orientation_tablet=&#8221;left&#8221; text_orientation_phone=&#8221;left&#8221; text_orientation_last_edited=&#8221;on|phone&#8221; module_alignment_tablet=&#8221;left&#8221; module_alignment_phone=&#8221;left&#8221; module_alignment_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Our ethical hackers simulate a realistic cyberattack, adopting the techniques of a real adversary. Their mission: to hit predefined targets using creative and unpredictable tactics, undetected by your defense team, the Blue Team.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||||true|true&#8221; custom_padding_tablet=&#8221;||||true|true&#8221; custom_padding_phone=&#8221;0px|0px|0px|0px|true|true&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221; box_shadow_horizontal__hover_enabled=&#8221;on|hover&#8221; box_shadow_blur__hover_enabled=&#8221;on|desktop&#8221; box_shadow_blur__hover=&#8221;20px&#8221;][et_pb_image src=&#8221;https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2024\/10\/locaux.png&#8221; alt=&#8221;Local Icon&#8221; title_text=&#8221;Local Icon&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; width=&#8221;25%&#8221; width_tablet=&#8221;20%&#8221; width_phone=&#8221;25%&#8221; width_last_edited=&#8221;on|phone&#8221; module_alignment=&#8221;left&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;11c3e866-10b0-4768-9648-3cd08582c530&#8243; text_font=&#8221;Inter|600|||||||&#8221; text_text_color=&#8221;#FCFCFC&#8221; header_text_align=&#8221;left&#8221; header_text_color=&#8221;#1A1A31&#8243; header_4_font=&#8221;Inter|||on|||||&#8221; header_4_text_color=&#8221;#1A1A31&#8243; header_4_font_size=&#8221;14px&#8221; custom_margin=&#8221;||5px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4>PHYSICAL ENVIRONMENT<\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;11c3e866-10b0-4768-9648-3cd08582c530&#8243; header_4_text_color=&#8221;#1A1A31&#8243; width=&#8221;78%&#8221; width_tablet=&#8221;100%&#8221; width_phone=&#8221;100%&#8221; width_last_edited=&#8221;on|phone&#8221; custom_margin=&#8221;||5px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4><span style=\"font-weight: 400;\">Test your organization&#8217;s physical security<br \/><\/span><\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;c170891f-9edb-4d5a-8298-f6c4e317d5cd&#8221; text_text_color=&#8221;#1A1A31&#8243; width=&#8221;100%&#8221; width_tablet=&#8221;100%&#8221; width_phone=&#8221;100%&#8221; width_last_edited=&#8221;on|tablet&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\">Determine whether unauthorized persons can access your critical infrastructure or information.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||||true|true&#8221; global_colors_info=&#8221;{}&#8221; box_shadow_horizontal__hover_enabled=&#8221;on|hover&#8221; box_shadow_blur__hover_enabled=&#8221;on|desktop&#8221; box_shadow_blur__hover=&#8221;20px&#8221;][et_pb_image src=&#8221;https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2024\/10\/environnement-cyber.png&#8221; alt=&#8221;Icon cyber environment&#8221; title_text=&#8221;Icon cyber environment&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; width=&#8221;25%&#8221; width_tablet=&#8221;20%&#8221; width_phone=&#8221;25%&#8221; width_last_edited=&#8221;on|phone&#8221; module_alignment=&#8221;left&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;11c3e866-10b0-4768-9648-3cd08582c530&#8243; text_font=&#8221;Inter|600|||||||&#8221; text_text_color=&#8221;#FCFCFC&#8221; header_text_align=&#8221;left&#8221; header_text_color=&#8221;#1A1A31&#8243; header_4_font=&#8221;Inter|||on|||||&#8221; header_4_text_color=&#8221;#1A1A31&#8243; header_4_font_size=&#8221;14px&#8221; custom_margin=&#8221;||5px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4>CYBER ENVIRONMENT<\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;11c3e866-10b0-4768-9648-3cd08582c530&#8243; header_4_text_color=&#8221;#1A1A31&#8243; width=&#8221;93%&#8221; custom_margin=&#8221;||5px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4><span style=\"font-weight: 400;\">Get a complete assessment of your defense<br \/><\/span><\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;c170891f-9edb-4d5a-8298-f6c4e317d5cd&#8221; text_text_color=&#8221;#1A1A31&#8243; width=&#8221;100%&#8221; width_tablet=&#8221;95%&#8221; width_phone=&#8221;95%&#8221; width_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\">Identify vulnerabilities that only real attackers could exploit. We test your defense and your Blue Team.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||||true|true&#8221; global_colors_info=&#8221;{}&#8221; box_shadow_horizontal__hover_enabled=&#8221;on|hover&#8221; box_shadow_blur__hover_enabled=&#8221;on|desktop&#8221; box_shadow_blur__hover=&#8221;20px&#8221;][et_pb_image src=&#8221;https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2024\/10\/collaborateurs.png&#8221; alt=&#8221;Icon collaborators&#8221; title_text=&#8221;Icon collaborators&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; width=&#8221;25%&#8221; width_tablet=&#8221;20%&#8221; width_phone=&#8221;25%&#8221; width_last_edited=&#8221;on|phone&#8221; module_alignment=&#8221;left&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;11c3e866-10b0-4768-9648-3cd08582c530&#8243; text_font=&#8221;Inter|600|||||||&#8221; text_text_color=&#8221;#FCFCFC&#8221; header_text_align=&#8221;left&#8221; header_text_color=&#8221;#1A1A31&#8243; header_4_font=&#8221;Inter|||on|||||&#8221; header_4_text_color=&#8221;#1A1A31&#8243; header_4_font_size=&#8221;14px&#8221; custom_margin=&#8221;||5px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4>HUMAN ENVIRONMENT<\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;11c3e866-10b0-4768-9648-3cd08582c530&#8243; header_4_text_color=&#8221;#1A1A31&#8243; custom_margin=&#8221;||5px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4><span style=\"font-weight: 400;\">Determine whether your employees are following best practices<br \/>\n<\/span><\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;c170891f-9edb-4d5a-8298-f6c4e317d5cd&#8221; text_text_color=&#8221;#1A1A31&#8243; width=&#8221;100%&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\">Analyze your employees&#8217; cybersecurity behaviors.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_direction=&#8221;311deg&#8221; background_color_gradient_stops=&#8221;#1a1a31 0%|#0b4650 100%&#8221; custom_padding=&#8221;||||false|false&#8221; custom_padding_tablet=&#8221;||6vw||false|false&#8221; custom_padding_phone=&#8221;20px||20px||true|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;2_5,3_5&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; width=&#8221;70%&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#0B4650&#8243; custom_padding=&#8221;||||true|true&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; border_color_all=&#8221;#B7F7CC&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2024\/10\/Mockup-Mitre-7.jpg&#8221; alt=&#8221;Mockup Mitre Att&amp;ck&#8221; title_text=&#8221;Mitre 7 mockup&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;37px||||false|true&#8221; border_color_all=&#8221;#B7F7CC&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;74f91c42-4ba7-4cbe-881f-bf82609ea1e5&#8243; header_3_text_color=&#8221;#FCFCFC&#8221; width=&#8221;74%&#8221; width_tablet=&#8221;100%&#8221; width_phone=&#8221;100%&#8221; width_last_edited=&#8221;on|tablet&#8221; custom_margin=&#8221;||10px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3><span style=\"font-weight: 400;\">Decipher the path of attackers with the MITRE ATT&amp;CK framework<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;c170891f-9edb-4d5a-8298-f6c4e317d5cd&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\">Our experts use the MITRE ATT&amp;CK framework to help you understand exactly how attackers conduct Advanced Persistent Threats (APTs). By adopting this standardized language, we facilitate clear communication between your teams and reinforce your cybersecurity strategy. By reproducing attackers&#8217; tactics, we give you a concrete vision of the risks specific to your organization, so you can better anticipate and counter them.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;rgba(252,252,252,0.15)&#8221; background_image=&#8221;https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2024\/10\/CTA.png&#8221; custom_margin=&#8221;70px||||false|false&#8221; custom_padding=&#8221;80px|50px|80px|50px|true|true&#8221; custom_padding_tablet=&#8221;80px|50px|80px|50px|true|true&#8221; custom_padding_phone=&#8221;30px|20px|30px|20px|true|true&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;04aefc12-0bc2-42e3-86c5-dd2d05a7cf91&#8243; header_2_text_color=&#8221;#FCFCFC&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Need a Red Team?<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;c170891f-9edb-4d5a-8298-f6c4e317d5cd&#8221; width=&#8221;86%&#8221; width_tablet=&#8221;100%&#8221; width_phone=&#8221;100%&#8221; width_last_edited=&#8221;on|phone&#8221; custom_margin=&#8221;-20px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>A Red Team exercise takes around 35 days spread over 8 weeks, with prices starting at \u20ac17,500 excluding VAT.<\/p>\n<p>Contact us today for a customized quote and to strengthen your organization&#8217;s security.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE3ODAiLCJlbmFibGVfaHRtbCI6Im9mZiJ9fQ==@&#8221; button_text=&#8221;Request a quote&#8221; admin_label=&#8221;row&#8221; _builder_version=&#8221;4.25.1&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;16px&#8221; button_text_color=&#8221;#1A1A31&#8243; button_bg_color=&#8221;#01DC94&#8243; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;12px&#8221; button_font=&#8221;Inter||||||||&#8221; button_icon=&#8221;&#x24;||divi||400&#8243; button_icon_color=&#8221;#1A1A31&#8243; button_on_hover=&#8221;off&#8221; custom_padding=&#8221;10px|50px|10px|30px|true|false&#8221; global_module=&#8221;2077&#8243; saved_tabs=&#8221;all&#8221; global_colors_info=&#8221;{}&#8221; button_bg_color__hover_enabled=&#8221;on|hover&#8221; button_bg_color__hover=&#8221;#B7F7CC&#8221; button_bg_enable_color__hover=&#8221;on&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; custom_padding_tablet=&#8221;&#8221; custom_padding_phone=&#8221;20px||20px||true|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_accordion _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; toggle_level=&#8221;h2&#8243; toggle_font=&#8221;||||||||&#8221; toggle_font_size=&#8221;18px&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][et_pb_accordion_item title=&#8221;What is a Red Team in cybersecurity?&#8221; open=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p style=\"text-align: justify;\">In the field of cybersecurity, the <strong>Red Team<\/strong> refers to a team of elite ethical hackers, whose mission is to<strong>imitate the behavior of a real attacker<\/strong> to test the resilience of an information system, a network, an application or even an entire organization. Unlike traditional security audits <a href=\"https:\/\/www.hackmosphere.fr\/en\/pentest-cyber\/\">or pentests<\/a>, which are often limited in time, scope and methodology, the Red Team approach is <strong>comprehensive, multidimensional and unannounced<\/strong>. The team can employ a variety of techniques, such as social engineering, targeted phishing, exploitation of technical vulnerabilities, physical compromise of infrastructures or bypassing detection devices.  <\/p>\n<p style=\"text-align: justify;\">The aim is not simply <strong>to identify vulnerabilities<\/strong>, but to demonstrate, with evidence, how a malicious actor could achieve a strategic objective such as accessing sensitive data, compromising a privileged account or disrupting an essential service. The Red Team generally works in a <strong>controlled environment<\/strong>, with the approval of senior management, but <strong>without informing operational teams<\/strong>, in order to test their ability to detect, analyze and react to a sophisticated attack. <\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;What are the different missions of a Red Team?&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; open=&#8221;off&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p style=\"text-align: justify;\">The missions entrusted to a Red Team are defined according to the <strong>strategic objectives of the test<\/strong>, the organization&#8217;s level of cyber maturity and the criticality of the assets to be protected. These missions are part of a &#8221; <strong>red teaming<\/strong>&#8221; approach, based on realistic, goal-oriented attack scenarios. For example, the Red Team may seek to penetrate an internal network from an external access point, escalate its privileges to gain access to a sensitive server, or bypass perimeter defense mechanisms to demonstrate a flaw in the surveillance system. It can also be aimed at specific targets such as the accounting department, system administrators or senior management, with the aim of simulating data exfiltration or internal fraud.   <\/p>\n<p style=\"text-align: justify;\"><strong>Red Team missions<\/strong> also include assessing staff awareness of manipulation techniques, the resistance of internal processes to compromise, and the <strong>responsiveness of SOC<\/strong> (Security Operations Center) <strong>teams<\/strong> to abnormal behavior. The advantage lies in the <strong>real-life setting<\/strong>, where all the means available to the attacker are simulated to test structural flaws, whether human, technical or organizational. <\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;What is the methodology of a Red Teaming exercise?&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; open=&#8221;off&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p style=\"text-align: justify;\">A <strong>red teaming exercise<\/strong> is based on a rigorous, structured methodology governed by precise rules. It always begins with a phase of <strong>defining objectives<\/strong>, in close collaboration with the organization&#8217;s decision-makers, who set limits, critical perimeters, authorized targets and expected results. Next comes the <strong>reconnaissance<\/strong> phase, during which the Red Team gathers as much information as possible about its target, through open sources (OSINT), passive scans or attack surface analysis. This stage is crucial for identifying intrusion opportunities without alerting defenses. Once the entry vectors have been defined, the Red Team moves on to the<strong>exploitation<\/strong> phase, where it uses offensive techniques to compromise systems, access data or break into internal network segments. This phase may include the use of customized malware, backdoors, privilege elevation techniques or pivoting attacks to stealthily advance into the targeted computer system.     <\/p>\n<p style=\"text-align: justify;\">The exercise also includes a <strong>persistence phase<\/strong>, during which the Red Team installs mechanisms to maintain prolonged access, just like real advanced threats. At the same time, it is careful to remain <strong>invisible<\/strong>, to test the ability of detection tools to identify abnormal activity. Finally, once the objectives have been reached or the allotted time has elapsed, the <strong>reporting<\/strong> phase begins, during which the Red Team submits a detailed account of its actions, the vulnerabilities exploited, the data compromised, the systems infiltrated and recommendations for improvement. This report then serves as the basis for the work of the <strong>Blue Team<\/strong>, responsible for reinforcing the defenses.   <\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;What&apos;s the difference between Red Team and Pentest?&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; open=&#8221;off&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p style=\"text-align: justify;\">Confusion between <strong>Red Team<\/strong> and <strong>penetration testing<\/strong> is common, but these two approaches have very different methodologies, scopes and objectives. A <strong>pentest<\/strong>, or penetration test, aims to identify as many technical vulnerabilities as possible on a given system, within a short timeframe and with a clearly defined scope. It is an exhaustive process, aimed at detecting exploitable vulnerabilities, often followed by a report containing a risk ranking and the corrective measures to be applied.  <\/p>\n<p style=\"text-align: justify;\">In contrast, a <strong>Red Team<\/strong> takes a strategic, focused and realistic approach. It doesn&#8217;t try to find everything, but to <strong>achieve a specific objective<\/strong> using the methods of a real attacker. It mobilizes a <strong>complete attack chain<\/strong>, integrating human (social engineering, phishing), logistical (physical access, identity theft) and technical (vulnerability exploitation, privilege escalation) dimensions.  <\/p>\n<p style=\"text-align: justify;\">Where pentesting reveals vulnerabilities, Red Team demonstrates how they can be exploited <strong>in real-life situations<\/strong>, often undetected. It simulates a complete intrusion, over several weeks, with phases of rest, reactivation and persistence, and sometimes interacts with physical security devices (access badges, video surveillance), making it a broader, more immersive approach. <\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;What are the benefits of Red Teaming?&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; open=&#8221;off&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p style=\"text-align: justify;\">This type of<strong>exercise <\/strong>enables a company or public authority to take a concrete measure of its <strong>cyber-resilience<\/strong> in the face of targeted, stealthy attacks. It reveals security <strong>blind spots<\/strong>, highlights <strong>configuration errors<\/strong>, <strong>weaknesses in procedures<\/strong> or staff <strong>training gaps<\/strong>. It validates the effectiveness of detection tools (SIEM, EDR, firewall), the responsiveness of incident response teams, and the coordination between the various cybersecurity players. By testing a complete scenario, from the initial intrusion to the achievement of the objective, Red Teaming offers a <strong>holistic vision of<\/strong> the security posture.   <\/p>\n<p style=\"text-align: justify;\">It also helps to reinforce the company&#8217;s in-house <strong>cybersecurity culture<\/strong>, to identify those employees most at risk from social engineering, and to focus future cybersecurity investments on areas of real priority. Finally, it creates a <strong>strong awareness effect<\/strong>, showing management in a concrete and factual way the real impact of a successful cyberattack. <\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>RED TEAMSee your organization through the eyes of an experienced attackerWith our Red Team exercise, simulate a sophisticated attack to assess the resilience of your systems, employees and infrastructure. Discover potential vulnerabilities and assess your ability to detect advanced attacks. Strengthen your defenses to better anticipate real threats.Simulate a full Red Team attack to test [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_seopress_robots_primary_cat":"0","_seopress_titles_title":"Red Team l Look at your organization like an attacker would","_seopress_titles_desc":"You're satisfied with your cybersecurity and pentests add little value? Create a red team to simulate a sophisticated attack.","_seopress_robots_index":"","_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-2629","page","type-page","status-publish"],"_links":{"self":[{"href":"https:\/\/www.hackmosphere.fr\/en\/wp-json\/wp\/v2\/pages\/2629","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hackmosphere.fr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.hackmosphere.fr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.hackmosphere.fr\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hackmosphere.fr\/en\/wp-json\/wp\/v2\/comments?post=2629"}],"version-history":[{"count":10,"href":"https:\/\/www.hackmosphere.fr\/en\/wp-json\/wp\/v2\/pages\/2629\/revisions"}],"predecessor-version":[{"id":3188,"href":"https:\/\/www.hackmosphere.fr\/en\/wp-json\/wp\/v2\/pages\/2629\/revisions\/3188"}],"wp:attachment":[{"href":"https:\/\/www.hackmosphere.fr\/en\/wp-json\/wp\/v2\/media?parent=2629"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}