Sophisticated security teams understand the value of Red Teams. There is simply no better way to find the holes, understand your weaknesses and identify blind spots in your security program. Active Crisis Consulting Red Teams are unannounced, unidentified teams of professionals who will attempt to breach your security systems physically or digitally and then provide you with a comprehensive report that will allow you to improve your program. Our Red Teams consist of three Tiers of service. TIER 3 focuses on physical bypass of security countermeasures. TIER 2 Red Teams focus on physical bypass but also breach electronic access systems by employing card cloning, social engineering and other techniques. TIER 1 Red Teams will use every current tactic and technique that is currently available to breach your systems. TIER 1 Red Teams will target the crown jewels of your organization, and critical assets can never be compromised and therefore require the highest levels of protection. TIER 1 Red Teams will research, surveil and stalk their target for days looking for weaknesses and vectors of attack or entry that can be exploited. Social engineering, fake credentials, and even fake repair technicians are all in play. We will employ the tools of tradecraft and covert entry methods that are usually reserved for sophisticated nation state attackers. We will throw everything that we have at you, and push every aspect of your security program to its breaking point.
TIER 1
Active Crisis Consulting TIER 1 Red Teams will research, surveil targets for weaknesses and vectors of physical bypass or covert entry that can be exploited.
_________________________
TIER 1 Red Teams focus on Military, Government and Defense Facilities, Harbors, Ports, Undersea Infrastructure, Corporate Headquarters, Ultra High Net Worth Individuals and the most Secure Facilities on the Planet.
_________________________
Tactics and Techniques:
- Electronic access systems breach
- Card cloning
- Social engineering
- Radio signals hacking
- Credential skimming
- False credentials
- Fake repair technicians / contractors
- OSINT scrapes
- Digital foot-printing
- Digital network implants
- Malicious cables
- Reverse shells
- Key loggers
- Man-in-the-middle attacks
- Wi-fi pineapple
- Bluetooth skimming
- Malicious payloads
- Undersea and covert entry
TIER 2
Active Crisis Consulting TIER 2 Red Teams focus on physical access and physical bypass, but also identify weaknesses in electronic access systems and attempt to breach them.
_________________________
TIER 2 Red Teams are ideal for Harbors/Ports, Sports Stadiums interior areas, Music Venues interior areas, Municipal Buildings and key Executives.
_________________________
Tactics and Techniques:
- Lock Picking
- Key Imprinting
- Door Bypass
- Lock Shimming
- Bump Keys
- Card cloning
- Social engineering
- Radio signals hacking
- Credential skimming
- Falsifying credentials
TIER 3
Active Crisis Consulting TIER 3 Red Teams focus on physical access and physical bypass of security countermeasures.
_________________________
TIER 2 Red Teams are ideal for Offices, Sports Stadiums, Music Venues, Municipal Buildings and key Executives who are interested in passive or active testing physical security countermeasures.
_________________________
Tactics and Techniques:
- Lock Picking
- Key Imprinting
- Door Bypass
- Lock Shimming
- Bump Keys
- Social engineering