Red Teaming

Data Exfiltration

In this scenarios, the attacker will use tools and techniques to steal data from the company systems and move them on a remote server.

Ransomware

In this scenarios, the attacker will use a ransomware-like techniques to “encrypt” some files on a system folder, a shared network folder or other support.

Identity Theft

In this scenarios, the attacker will try to steal a user account or digital identity inside the company by either using complex attacks or social engineering attacks

System takeover

In this scenarios, the attacker will takeover a system and will manipulate the services on it.