Red - Team Operations Brochure - Final v1
Red - Team Operations Brochure - Final v1
Introduction
Every organization needs to plan for a potential breach, no matter how strong its security defenses are.
In order to detect a breach and contain it, the organization’s incident response team (blue team) needs
to practice their approach and methodologies on a regular basis to keep abreast of the latest techniques
and tactics.
Our research (Global Risk Value Report 2019) has shown that the costs of a data breach and recovering
from it is 12,7% of an organization’s revenue and the recovery time is on average 66 days. A well-trained
incident response team has shown great value to cut down the incurred costs to recover from a data/
security breach.
With an ever-evolving threat landscape and IT perimeters growing year after year, it’s of utmost
importance to have an effective strategy and up-to-date capabilities to detect and defend against
sophisticated attackers.
A growing number of organizations are looking for services that can simulate real-world attacks executed
with similar tactics, techniques and procedures (TTPs), as seen ‘in the wild’, so they can evaluate their
current state of readiness for detecting and responding to breaches. These exercises uncover gaps
within the security fabric of an organization, which are not visible in normal day-to-day operations.
NTT Red Team Operations is a seasoned team of red team operators acting as ethical hackers, with
more than 45 years of experience combined. Our team has a proven track record in discovering critical
vulnerabilities in the most complex environments.
They have extensive prior background in designing and implementing high-end IT infrastructures, with
expertise in testing environments covering a variety of system and application technologies, frameworks,
and a wide range of potential attack vectors.
This document aims to provide a broad view of our offensive security capabilities. While it contains
examples of different projects, it’s only a subset of all that NTT can offer to you. Most of our clients have
special requests based on their reality and for which NTT tailors a customized approach that fulfils their
specific needs.
at
r as
ic
re
io
tu
pl
are instructed to temporarily lay off certain defenses and tr
nB
uc
Ap
uc
response procedures so that a more complete worst-case
tr
A Sy
tu
r as
st
em
re
assessment can be performed.
Inf
B
em
st
Sy
B
In comparison, red teaming always targets specific objectives
and relies on stealth and evasion. A strong focus is set on End-goal
reconnaissance in which information is collected that will
Sy
D
em
em
st
help the Red Team Operators to effectively plan their attacks st
eD
Inf
C Sy
r as
ur
avoiding detection by the client security team (blue team). uc
t
tr
tr
uc
t ur
Only a limited set of people (white team) is aware of the eC ras
Inf
Ap
nD
pl
at
io
incoming/ongoing attack on the organization and the blue
ic
io ic
at
nC pl
Ap
team is kept in the dark. The red team will not attempt to
identify all vulnerabilities, but will try to find a way to achieve
the predefined milestones by exploiting vulnerabilities and
security gaps in deployed technologies, company processes Red team
and people’s behavior. Experienced red teaming operators
• Broad and objective-based
will then be able to chain vulnerabilities from different levels
to successfully achieve their target, uncovering previously • All phases of cyberattacks
unidentified security gaps. Blue teams will be challenged • Stealthy
and put under pressure by simulating a real attack, which
• Attack paths/threats reported
can be measured by the organization to further improve the
responsiveness and effectiveness of their defense strategies.
r as
ic
tu
pl
tr
nB
uc
Ap
A Sy
tu
r as
st
a specific server, and more). In scenario-based penetration em
re
Inf
B
em
st
of the tests and should not intervene to stop any attack. End-goal
Sy
em
em
st
st
eD
Inf
C Sy
r as
ur
uc
t
tr
tr
uc
t ur
eC ras
Inf
Ap
nD
pl
at
io
ic
io ic
at
nC pl
Ap
Pentesting
• Limited and precise
• No further than exploitation
• No blue team exercises
• Vulnerabilities reported
Adversary Emulation
Unlike typical Red Team operations where attacks are planned and calibrated based on the specific environment of the target
organization, adversary emulation aims to mimic a threat based on real-world intrusion cases. Usually, these cases were originally
executed by Advanced Persistent Threats (APTs) such as nation states or cybercrime groups.
These intrusion campaign plans, and their phases are well documented through many threat intelligence reports focusing on
malware reverse engineering, initial compromise techniques and command and control usage. These are mapped against the
MITRE ATT&CK framework and any missing gaps are filled in by using other known adversary tactics, techniques and procedures
(TTPs) and behaviors.
NTT red team operators can execute these plans to test client resilience against APT style attacks.
Credential Exfiltrate
Persistence
access
Obfuscate Files
Lateral
movement
Initial Access
Execution
Replay and
Generic threat Engagement Target Red Sharing
Procurement remediation
landscape and scoping intelligence Teaming practices
planning
Four to eight weeks Four weeks Twelve weeks Six weeks to months
The return on investment for an organization performing purple teaming is quite significant. The short feedback loop between the
attackers and defenders results in little time lost from the actual attack to the implemented mitigation strategy.
Social Engineering
Physical intrusion is the most straightforward Reporting of the mission will highlight
scenario that’s often combined with other
attack vectors such as Wi-Fi and internal the vulnerable paths in the physical
network breaches. All information systems
physically exposed in company premises are protections, as well as the security
directly vulnerable to physical intrusions.
awareness improvement areas
A ‘breaching the perimeter’ scenario focuses
on the first two layers of defence: the physical
protections and the person. NTT ethical hackers
will assess the security awareness of the
employees and attempt to obtain privileged
access to information systems from inside the
company buildings. End
goal
The company assets will be assessed with tools
such as wireless antennas, embedded systems
to attach via USB or RJ45 and any other ways Attack:
to bypass physical controls, like badge cloning
devices. The ethical hackers will prepare pretexting
several scenarios in which they use pretexting and influence
and influence techniques against company
employees to reach the predefined objectives.
The goal(s) of a social engineering attack Scenario
are defined at the start of the engagement. development
Examples are:
• intrusion in high-security areas
• obtain an entry in the internal network, via
an RJ45 outlet or others Reconnaissance
• deploy malware on an employee’s laptop
• steal confidential information
Vulnerability research
Making the difference
Our Red Team Operators strive to make an impact in the world of cybersecurity. Dedicated time is spent on researching
vulnerabilities in well-known vendor products.
We continuously increase our skills through training and research into products widely used by organizations around the world.
As a result, the team has an arsenal of exploits previously unknown to the public, which is used to demonstrate the strengths and
capabilities during NTT red team operations.
We’re also very active in Capture The Flag (CTF) competitions and bug bounty hunting.