Beyond Penetration Testing
Goal-oriented adversary simulation, not a vulnerability checklist
What Makes a Real Red Team Engagement
A red team engagement is not a longer penetration test. It's a goal-oriented operation where a small cell of senior offensive operators is given crown-jewel objectives — exfiltrate customer PII, transfer funds, take down production, access the CEO's mailbox — and a window of weeks or months to achieve them by any means short of physical harm or data destruction. Detection and response are part of the test, not exclusions from it.
Engagement Models
Pick the model that matches your maturity, risk appetite, and regulatory pressure
Full-Scope Red Team
External-to-internal adversary emulation against named objectives. Includes phishing, exploit development, and custom C2 infrastructure. Best for mature security programs that need a true blue-team workout.
Assumed Breach
We start with a planted foothold (low-privilege user, compromised workstation, or rogue cloud key) and measure how far we get before detection. Most efficient way to validate internal controls and lateral-movement detections.
Purple Team
Collaborative engagement where our operators run ATT&CK techniques side-by-side with your SOC. Each technique is detonated, detected (or not), tuned, and re-tested. Fastest way to raise mean-time-to-detect.
Cloud Red Team
Adversary emulation focused on AWS, Azure, and GCP environments. Covers identity federation abuse, cloud persistence, lateral movement across accounts, and exfiltration through native services. Mapped to MITRE ATT&CK for Cloud.
AI / ML Red Team
Adversarial testing of AI systems and the infrastructure around them: prompt injection, model extraction, training-data poisoning, and abuse of AI-driven business logic. Aligned to OWASP Top 10 for LLM Applications and MITRE ATLAS.
Threat-Led (TIBER / CBEST)
Intelligence-driven red team aligned to TIBER-EU, CBEST, or DORA TLPT requirements. Threat intelligence informs scenario design; engagements are conducted under regulator-style controls with bespoke reporting.
How We Operate
A senior cell of operators, real adversary tradecraft, full kill-chain coverage
Threat Modeling & Objectives
We work with your leadership to define crown-jewel objectives, rules of engagement, and the threat actors most relevant to your industry. Output: a scenario brief mapped to ATT&CK and your business risk register.
Reconnaissance & Weaponization
OSINT, infrastructure profiling, employee enumeration, and custom payload/implant development. We stand up isolated C2 infrastructure with redirectors and domain fronting where appropriate.
Initial Access
Phishing, password-spray against exposed services, MFA-bypass techniques, supply-chain abuse, or assumed-breach handoff. Initial access is engineered to evade your specific email gateway, EDR, and SOC playbooks.
Persistence & Lateral Movement
Privilege escalation, credential theft, Kerberoasting, AD CS abuse, cloud-identity pivoting, and lateral movement under SOC visibility budget. Every technique is logged with timestamps for blue-team correlation.
Action on Objectives
Reaching the crown jewels — without actually exfiltrating sensitive data. We demonstrate access (screenshots, file listings, transaction-staging) and stop short of operational impact, with your approval gates throughout.
Debrief & Detection Deltas
Full ATT&CK heatmap showing which techniques were detected, which were missed, and the dwell time at each stage. Executive narrative for the board, technical report for the SOC, and a re-test offering 90 days out.
Senior Operators Only
Every Nomad red team engagement is staffed by operators with OSCP, OSEP, CRTO, GXPN, and OSCE3 certifications and prior experience in government, defense-industrial-base, or top-tier consulting red teams. No juniors learning on your environment.
Custom Tradecraft
We develop bespoke implants, evasion techniques, and infrastructure for each engagement. Off-the-shelf tooling gets caught by modern EDRs — and catching off-the-shelf tooling doesn't tell you whether you'd catch a real adversary.
ATT&CK-Mapped Reporting
Every action is tagged to a MITRE ATT&CK technique. You receive a heatmap of detection coverage, dwell time per stage, and concrete detection-engineering recommendations — not just a vulnerability list.
Re-Test & Purple Team Follow-Up
We don't disappear after the report. Standard engagements include a 90-day purple-team day to validate remediations and a free re-test of any technique your team has since hardened against.
Red Team FAQ
Find Out If You'd Catch a Real Adversary
Schedule a scoping call with our lead operators. We'll discuss your environment, threat model, and the right engagement model for your maturity.
Schedule a Scoping Call