Bulletproof’s range of cyber security, data protection and compliance services are your best defence against threats to your business. With nearly a decade of providing trusted security services, we’re continuing our mission of solving the greatest cyber security & compliance challenges through innovation and simplicity. Explore our range of services and find out how Bulletproof can help your business.
Helping people solve their security challenges is what we do, so we’re always keen to hear from you.
Discover CREST penetration testing & continuous security
Internal & external infrastructure, network & system testing
Manage multiple tests & get external security assurance
Thoroughly assess your web apps & APIs for security flaws
Test your response to a simulated real-world cyber attack
All cloud platforms & services tested, including Azure & AWS
Test your human cyber defences with social engineering
Android, iOS & custom mobile application security testing
Find out more about penetration testing – what it is, when you need it, and why it’s a core component of any business. Discover how pen test helps with compliance, powers best practices, and helps your organisation win new business.
Gap analysis, implementation, audits & more from GDPR experts
On-going support to easily manage your data protection obligations
Consultant-led support to meet all levels of DSPT submission
Flexible & engaging data protection training from certified experts
Get peace of mind that your data protection is being managed by trusted, certified consultants. All Bulletproof data protection services are delivered by our highly trained, experienced and qualified staff.
Gap analysis, implementation, audits & more from dedicated ISO consultants
Find the next step in your strategy with this consultant-led assessment
Get quick & easy CE certification with a range of feature-packed packages
Flexible access to top-tier information security strategy & management
Experienced SOC 2 consultants, AICA audits & compliance automation platform
On-site, remote and video-based security training to boost your resilience
Affordable expertise & support to help you meet & maintain PCI DSS compliance
Go beyond compliance with information security services that are designed to give real operational benefits to your business. All delivered by seasoned, certified Bulletproof security consultants.
24/7 defence against cyber attacks with proactive threat detection
Get help responding & recovering from cyber incidents
Detect, analyse and stop cyber attacks with real-time prevention
Forensic support & data recovery following cyber attacks
Stay on top of new vulnerabilities with powerful, flexible scanning
Evaluate your wireless network for security weaknesses
Discover how your business can identify & manage cyber threats
Comply with regulations, meet certification standards & best practices
Train and test your staff for security resilience, data protection & compliance
No matter what your cyber or compliance challenges, Bulletproof is here to help. We like to work with you as a trusted partner to solve problems, not sell services. No pressure tactics and no false promises.
Learn about our mission to make cyber & compliance accessible to all
Grow your business with high-margin, high-value & partner-ready services
Become part of the Bulletproof team & supercharge your career
Bulletproof’s in-house SOC powers our Managed SIEM & MDR services
We love to talk. Tell us about your cyber & compliance challenges
At Bulletproof we love to solve problems with simplicity & innovation. It’s our mission to make compliance & cyber security services accessible to all. We take pride in building and nurturing teams of exceptional talent, so we’re confident that our cyber security & compliance services are the best way to stay one step ahead of the hackers and protect your business.
Helping people solve their security challenges is what we do, so we’re always keen to hear from you, no matter what you have to say.
Get the latest news, views & expert insight in the world of cyber security, data protection & compliance
A helpful index of cyber security terms, compliance acronyms and industry terminology to make life easy
Discover what we have to say about the threat landscape & what businesses need to know to get ahead
Find out how we can make companies like yours Bulletproof. Don’t take our word for it, hear direct from our clients
Detailed insights & helpful tips for understanding penetration testing, data protection & more
Interesting data & top tips at a glance, with insightful infographics covering all areas of cyber security & compliance
Watch our experts talk through their thoughts & opinions on a variety of security & compliance topics
See when & where we’re going to be bringing Bulletproof insight to an event near you
Ayisha Bari
Find out what ransomware is, how attacks work & types of attack to help you get started with keeping ransomware out of your business.
Read More
We at Bulletproof provide a range of different cyber security services, including penetration tests, managed SIEM, and DPO outsourcing. Though undoubtedly the most interesting (and cool) service we offer are our red team assessments.
So, what is a red team test? Put simply, a red team test is where security experts compromise a company’s cyber and physical security through a mix of penetration testing, social engineering and deceit. A red team aims to get hold of data remotely or through direct contact with an organisation's on-premises machines. Preferably, not getting caught in the process. Once done, the team can report back to the company with what they did, how they did it (with evidence), and most importantly, how the business can stop it from happening again.
Typically, only one or two people at the organisation being red teamed will know about it – the majority of staff will be completely unaware of what’s going on. It’s like Ocean’s Eleven, only with significantly less George Clooney and more time spent on research. In fact research is the most important element.
As red team testing requires us to test every aspect of an organization's security infrastructure it can involve a variety of strategies and present some diverse challenges for the team. Typically, we begin with an internet search including any social media profiles associated with the company to see what information is freely available for us to leverage. We were once asked to assess an office and its systems with only the name of the company we were targeting and their website address, which while it is the most ‘true to life’ hacking scenario is the most extreme environment for a red team to work in, especially if the test is time sensitive. So, we set to work by scouring the Internet for any information we could use to plan or carry out our attack.
Funnily enough, it was through a red team test we discovered we could compromise a business using only a few pints of milk – and this didn’t involve pouring it over the servers! Red team assessments require a multi-layered approach that seeks to test every aspect of a company’s security – the technical and physical elements, the people. Even management aren’t exempt. We try to compromise a business using any means at our disposal, and as it happens posing as the milkman is a great way to gain access.
Our first bit of Internet recon revealed some useful information:
In all, it took us just under an hour of looking at publicly available information to learn:
We discovered some potential digital vulnerabilities as well. Firstly, their website was running a vulnerable version of WordPress, and although we couldn’t fully compromise the server as it had been well hardened, we were able to write new pages and sites for it.
Based on this, we decided on a two-pronged attack:
Our phishing portal was very hard to spot as it was well disguised on its own server, on the company domain and complete with a valid SSL certificate. Several workers were caught out by it, and this gave us access to their accounts. The client didn’t expose any remote desktop or cloud-based services for us to use, so we hung onto these stolen credentials for later…
Thanks to modern smartphones being so advanced, the images of employee badges were good enough for us to replicate their appearance. While they looked legitimate enough at first glance, we didn’t know what technology we needed to access the automatic door system. We created several kinds of cards based on known electronic badge types. These didn’t work, but one using the same technology made a warning ‘beep’ sound, which we used to add a sense of authenticity.
Once I arrived on the premises, a quick look around the general area confirmed that there was indeed a back door. However, it was a fire exit adorned with a sign that read ‘this door is alarmed’. As I was trying to be inconspicuous as possible, I decided to go through the front, non-alarmed door. This was obviously a bold move as it meant marching right into the line of sight of a security guard, who wouldn’t recognise me and could ask questions I was completely unprepared for.
Now, this truly separates red team testers from penetration testers. I strolled in, carrying several bottles of milk I purchased previously. I nodded to the security guard and gestured to the milk in my hands, saying ‘milk run’. Next, I swiped my card, triggering warning beeps. I repeated the process, pretending to get annoyed with it not working until the security guard came over.
“This thing hasn’t worked properly since I put it through the wash”, I said. With a pleasant chuckle, the security guard swiped me through and even pressed the call button on the lift for me. From here, blagging my way into the office itself was easy, and I even dropped off the milk in the kitchen area. After all, if I’m about to steal a load of information, it’s the least I could do!
Once in the office, I took out my laptop (complete with large Wi-Fi antennas) and strolled around with an intense look of concentration. Fortunately, if you work in IT, most people are reluctant to speak to you unless they absolutely must, so I was able to make my way to a partially empty office and plug a disguised USB ethernet adaptor into an unmanned desk PC.
Our USB ethernet adaptor contained a small Linux machine that would remotely connect to our own servers and allow us to tunnel into the target network. However, it seemed the internal network had some form of filtering in place that blocked unknown devices, which would have meant that the entire endeavor could have ended there, (wasting several pints of perfectly good milk). You’d be forgiven for thinking this meant game over – but I wasn’t giving up easily. Remember, we were also armed with several user credentials we’d obtained via our phishing portal. After logging into the computer, we were able to bypass this filtering and gained access to their servers.
From here on in, the rest is mostly the same as any internal penetration test. We found things that were broken, abused them, stole passwords, spread further and kept on going and gathering evidence until there was nowhere else to go or until we were caught. We weren’t caught on this occasion. But as part of this experiment, we provided our client with a comprehensive report and helped them to tighten their processes and improve their cybersecurity. We demonstrated how far a malicious threat could be willing to go to gain access to their business. It’s not always someone at a laptop on the other side of the world. Sometimes it’s simply a man with some milk.
As you can see, a red team test is very involved. You might think that your company is too small to attract this level of attention, and to some extent you might be right. We’re not likely to try to sneak into a five-person strong team claiming to be the new intern, but we will try every other trick in the book. We adapt our tactics to the situation. Smaller companies tend to have less sophisticated technology or be laxer in their processes. Hackers often take the path of least resistance, meaning smaller companies will always be in their crosshairs.
Of course, not every company would benefit from a red team test, but if you’re storing large quantities of sensitive data that would benefit nefarious entities, it’s good to make sure every aspect of your security is as strong as it could be, because hackers will try to get at it one way or another.
Tom is a penetration tester and ethical hacker who writes insightful articles on all things ethical hacking and red team testing.
If you think your business could benefit from an in-depth red team test, take a look at what Bulletproof can offer.
If you are interested in our services, get a free, no obligation quote today by filling out the form below.
I'd like to receive Bulletproof communications about relevant services and events
For more information about how we collect, process and retain your personal data, please see our privacy policy.