Red Teaming
APT Simulation
in Italy
We simulate a real APT attack against your organization. MFA-bypass phishing, lateral movement, Active Directory compromise, data exfiltration. Find out how your defenses hold before a real attacker does.
Methodology
How an engagement unfolds
Reconnaissance and OSINT
Target profiling: employees (LinkedIn, email patterns), exposed infrastructure, digital assets, critical suppliers. We build the profile a real attacker would use.
Initial Access — MFA-bypass phishing
Phishing campaign using EvilGinx2 infrastructure to capture authenticated sessions, bypassing two-factor authentication. Target: specific high-privilege employees.
Lateral Movement and Privilege Escalation
Internal network lateral movement with Sliver/Havoc C2. Escalation to Domain Admin in Active Directory. Techniques: Kerberoasting, Pass-the-Hash, BloodHound path analysis.
Exfiltration and Proof of Impact
Demonstration of the agreed objective: access to the target DB, sensitive data exfiltration, ransomware simulation (no actual encryption). Undeniable proof for the board.
Investment
Red teaming pricing
All prices exclude VAT. Written authorization required before any engagement. Request briefing →
Ready to seriously test your defenses?
Free initial briefing. We define objective, scope and timeline together before any commitment.
Request briefing