SchellmanCON is back! Join us for our virtual conference on March 6 & 7, 2025

Contact Us
Services
Services
Crypto and Digital Trust
Crypto and Digital Trust
Schellman Training
Schellman Training
Sustainability Services
Sustainability Services
AI Services
AI Services
About Us
About Us
Leadership Team
Leadership Team
Corporate Social Responsibility
Corporate Social Responsibility
Careers
Careers
Strategic Partnerships
Strategic Partnerships

Penetration Testing

Red Team Assessment

By purposefully circumventing your technical and administrative security controls, a red team assessment is the closest you can get to confirmation of how well-equipped your organization is to defend against a skilled and persistent attacker.

Contact a Specialist Start Scoping Your Next Pen Test

What Happens During a Red Team Assessment?

Our primary red team objective is to conduct a comprehensive assessment of your organization's technical infrastructure, as well as evaluate your people and procedures. Upon reaching the predetermined objective, we deliberately attempt to trigger your incident response system to test its effectiveness in detecting and responding to our actions.
Throughout the assessment, we meticulously document any indicators of compromise, exploits, and instances of pivoting or accessing new shares. This information is crucial during the debrief with your defensive team at the conclusion of the engagement.

A Red Team Assessment Can Help You:

https://www.schellman.com/hubfs/social-prepare-for-real-world-attacks.svg

Identify Information Security Gaps

Red team engagements identify vulnerabilities within processes such as misconfigurations with log aggregation and AV/EDR configurations.

https://www.schellman.com/hubfs/staff-awareness.svg

Empower Your Defense Team

This type of assessment includes logging and categorizing specific tactics, techniques, and procedures (TTPs) used in the test, providing your team with valuable data in their continued work.

Schellman’s Red Team Assessment Methodology

To execute a red team engagement, our team will employ various methodologies (outlined below) as well as cutting-edge techniques to simulate the same type of breach attacks that a real-world attacker might use.  

These will be reproducible processes to ensure that the results are consistent and can be repeated for security operation center analysis. To enhance the repeatability, the MITRE ATT&CK framework will be leveraged, a globally accessible knowledge base of adversary tactics and techniques for exploitation activities.

  • Goal Setting and Objectives
  • Reconnaissance
  • Vulnerability Discovery
  • Exploitation
  • Post Exploitation
  • Credential Access / Discovery and Lateral Movement
  • Exfiltration
  • Kill-Chain Analysis
  • Reporting

Is Schellman the Right Firm for You?

Schellman does perform red team assessments—our Penetration Testing Team continues to grow and is currently comprised of individuals from different backgrounds including former developers, system administrators, and lifelong security professionals. Our team is incredibly experienced, and collectively holds the following professional certifications, among others

Frequently Asked Questions

How long will a red team assessment test take?

What does a red team assessment cost at Schellman?

How is a red team engagement different than a penetration test?

What is the goal of a red team assessment?

What kinds of organizations should conduct a red team engagement?

Get started with your Red Team Assessment

Our team of practice leaders, not sales, are ready to talk and help determine your best next steps.

Start Scoping Your Penetration Test Contact a Specialist