Red Teaming

Manuel Geissinger

xing logo linkedin logo Certified Ethical Hacker

Network Sec

Penetration Testing

Full APT attack simulation

Testing your defenses in realistic scenarios
Hexagons showing a way to bypass security controlls

Inside

Targeted Attacks on any part of your infrastructure. Full engagement on a fixed set of rules.

  • right pointing arrow Deep research into current and past APT TTP and activity
  • right pointing arrow Simulating anything that could happen
  • right pointing arrow Blackbox attacks on your Web- and Mobile Apps
  • right pointing arrow Covert Ops including OSINT, HUMINT, Social Engineering, API- & Supply Chain Attacks
  • right pointing arrow Receive technical Reports you can utilize from day one

Not a purely technical test

RED TEAMING ALSO MEANS ATTACKING YOUR MOST VALUEABLE & MOST VULNERABLE ASSETS: HUMANS

Dragon For reconaissence we deploy our complete toolkit
Key
Stage 1 includes OSINT, HUMINT & Code Review Malware Email Attachement
Arrow pointing down
Dragon We found a key for Stage 2, maybe a technical Vulnerabilty
Key
Securing Foothold while your core team is asleep Malware Email Attachement
Arrow pointing down
Dragon At Stage 3 we've secured full access to your assets
Key
Congratulations! We could have been the bad guys Malware Email Attachement
Donut style stats diagram

Complete coverage on every vector

We are humans

We are humans, too!

"For over 20 years we had to defend against unknown threat actors. We know the Blue Team side and seek to help on painpoints!"

Get the Pentest Report you need

Instead of the report that would have been nice. Our reporting thrives to make you more secure and not make you feel better (or worse), it's not meant to tick some boxes.
Three symbols in circular order represent the corner stones of our pentest reports
Cover image of example Cyber Threat Intelligence Report
We focus reports on practical value
  • Get insight on outdated parts of your infrastructure
  • All steps are documented for you to repeat the intrusion we made
  • We always add a recommedation section
Cover image of example Cyber Threat Intelligence Report
Visual quality is key to bring understanding
  • Our main priority is making you understand the issues
  • Attacks are illustrated using top notch graphics
  • Custom scripts & POCs used in attacks are well documented and delivered inside the report
Cover image of example Cyber Threat Intelligence Report
Human reports
  • Get statistics on employee responses
  • If the entry was provided by a human being, we will show how to avoid this kind of attacks using easy instructions
Phone Icon +49 761 59515151
Phone Icon PGP Key Download
Phone Icon contact@network-sec.de
arrow pointing upwards
"Doing a Red Team Engagement we find existing leaks, insider threats and real, active campaings. Yeah, that happens."
A flashlight shining on a few bugs walking by Even though it's an unintended side-effect, a Red Team Engagement will shine light in a few dark corners of your company arrow pointing downwards

Ethical Hacking is different

Desktop with open Bash, BurpSuite and VSCode showing a CVE implementation.

A pentest is not a pentest. Our engagements are driven by a real, active Hacker, not an automated scanner or an entry-level technician. Hacking not always means: breaking into a server. A large part of our activity is research, learning, training, testing of Web- and Mobile Apps and working out new CVEs, cause we need to be better than the bad guys.

  • right pointing arrow Just for you: Our goal is to get to know you
  • right pointing arrow Technical Edge Operations
  • right pointing arrow Set and forget: Once the paperwork is done you don't have to do anything
  • right pointing arrow Stay in control: Unlike at some competitors you can pause the engagement at any time
  • right pointing arrow Grow and learn with us