We offer two main consulting services: pen-testing and red teaming. Select one of the two items to learn more.
What is the difference between pen testing and red teaming?
The boundaries between pen testing and red teaming are blurred. A principle to distinct the two is based on exploitation: a pen tester will see and identify all options that can be done; a red teamer will decide on a path of attack and actually exploit vulnerabilities as well to gain access. This has an increased risk for the target system depending on the type of exploitation. This can be mitigated by avoiding buffer overflow attacks for example.