KPI · 01
Mean Time to Detect
Measured per kill-chain phase. You see exactly where your visibility collapses.
RED TEAM OPERATIONS
Our red team engagements typically run six to twelve weeks and do not end with a list of open ports. They end with an answer to a question your board has asked: can somebody compromise our most important asset without us noticing?
01 · OBJECTIVES
Together with you we define hard, verifiable goals: domain takeover, exfiltration of a defined dataset, access to an OT segment, compromise of a privileged administration workstation. Every objective has a binary criterion — reached or not. Secondary objectives emerge organically from the operation.
02 · KILL CHAIN
External mapping of your attack surface, employee profiles, technology indicators, and supply chain. The foundation for tailored entry vectors.
Spear phishing, exposed services, physical vectors, voice-based social engineering. Proven TTPs first, custom tooling where needed.
Establishing a stable command-and-control channel with realistic beaconing patterns. EDR-awareness and OPSEC discipline are baseline.
Local and domain escalation. Kerberos abuse, delegation paths, ADCS misconfigurations, tier-0 compromise.
Movement along identified trust relationships while deliberately avoiding obvious indicators. No mass mimikatz, no noise.
Reaching the agreed objective. For data exfiltration we use pre-seeded canary records, never real customer data.
Joint replay session with your blue team. Every TTP replayed, detected or not, documented. Operation becomes measurable improvement.
03 · METRICS
KPI · 01
Measured per kill-chain phase. You see exactly where your visibility collapses.
KPI · 02
Coverage of used TTPs against MITRE ATT&CK, weighted by phase and criticality.
KPI · 03
Duration from initial access to objective. Benchmarkable against prior engagements.
MEASURE MATURITY
We calibrate scope and TTP sophistication to your current maturity. Every engagement ends with a detection-engineering backlog your team can work on immediately.