
Whereas Penetration Testing is concerned with finding as many gaps in an organisations defences as possible and documenting how these might be exploited to gain unauthorised access and conduct malicious activity, a Red Team engagement simulates a real world and real time attack. Depending on the scope of the exercise, Red Teams can bring more attack vectors to the table, such as crafting targeted malware, utilising social engineering techniques, and scoping and compromising physical security measures that may be in place. Unlike a PT, which is often conducted on a staging system and with stricter time controls and prior notification, a Red Team exercise is fluid and designed to run under the radar, therefore offering a great insight into the overall effectiveness of the current security posture, spanning people, processes, and technology.