{"id":22290,"date":"2025-12-30T09:34:27","date_gmt":"2025-12-30T09:34:27","guid":{"rendered":"https:\/\/www.synetis.com\/red-team-purple-team\/"},"modified":"2026-05-11T12:05:01","modified_gmt":"2026-05-11T12:05:01","slug":"red-team-purple-team","status":"publish","type":"page","link":"https:\/\/www.synetis.com\/en\/ssi-audit\/red-team-purple-team\/","title":{"rendered":"Red Team &#038; Purple Team"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"22290\" class=\"elementor elementor-22290 elementor-10136\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7832a80 e-flex e-con-boxed e-con e-parent\" data-id=\"7832a80\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3e4f659 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"3e4f659\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:400}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c3605d1 elementor-widget elementor-widget-shortcode\" data-id=\"c3605d1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\"><div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.synetis.com\/en\/\" title=\"Accueil\">Accueil<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u203a<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.synetis.com\/en\/ssi-audit\/\" title=\"SSI audit\">SSI audit<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u203a<\/span><span class=\"aioseo-breadcrumb\">\n\tRed Team &amp; Purple Team\n<\/span><\/div><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-30325ff elementor-widget elementor-widget-heading\" data-id=\"30325ff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Redteam \/ Purpleteam<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-05554ba elementor-widget elementor-widget-text-editor\" data-id=\"05554ba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-208d7a7 elementor-widget elementor-widget-text-editor\" data-id=\"208d7a7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><div class=\"elementor-element elementor-element-208d7a7 elementor-widget elementor-widget-text-editor\" data-id=\"208d7a7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><p>A Redteam mission to simulate the behavior of an attacker in real-life conditions against your Information System, as well as a Purpleteam mission to train your BlueTeam team!<\/p><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-897e4aa elementor-invisible elementor-widget elementor-widget-button\" data-id=\"897e4aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#contact-audit\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact our teams<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c0162c2 e-flex e-con-boxed e-con e-parent\" data-id=\"c0162c2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5a04d67 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"5a04d67\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Go beyond the intrusion test: simulate the offensive of a determined attacker<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7cca607 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"7cca607\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Contrary to what you might think at first glance, the Redteam mission is not a penetration test. The Redteam mission is a type of attack designed to simulate the point of view of an external, motivated attacker, whose aim is to break <b>into your organization&#8217;s network<\/b> with a view to carrying out<b> sabotage<\/b> operations, <b>stealing strategic data<\/b>,<b>installing ransomware or<\/b> even <b>persistence software<\/b>, etc. The Redteam mission is not an intrusion test. <\/p><p>Unlike penetration testing, which is limited to a restricted perimeter (a URL, a Web application, an office computer network, etc.), Redteam&#8217;s mission is to target the organization in its entirety: both its online aspects (external exposure, collaborators on Linkedin-type platforms, searching for leaked passwords on the Darknet, etc.) and its physical aspects (intrusion into premises, depositing malicious USB keys, lock-picking, tail-gating).<\/p><p>During a penetration test, the auditors conduct the most exhaustive research possible into the vulnerabilities that could impact the perimeter under test. A Redteam mission, on the other hand, is aimed more at obtaining various trophies, representing key objectives to be achieved by a simulated attacker (exfiltration of sensitive data, access to business software, etc.). <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4dfaf54 e-flex e-con-boxed e-con e-parent\" data-id=\"4dfaf54\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-07b3117 e-con-full e-flex e-con e-child\" data-id=\"07b3117\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-c9b56e3 e-con-full e-flex e-con e-child\" data-id=\"c9b56e3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-032e07a elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"032e07a\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Discover the benefits of a Redteam mission<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3b73412 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"3b73412\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>The Redteam mission provides answers to the following questions:<\/p><ul><li aria-level=\"1\">What sensitive data can your organization obtain from the Internet?<\/li><li aria-level=\"1\">Are your employees sufficiently aware of social engineering practices (phishing, spear-phishing)?<\/li><li aria-level=\"1\">What are the consequences of losing or stealing a company laptop?<\/li><li aria-level=\"1\">Is someone from outside the organization capable of infiltrating the premises in search of sensitive documents? Are employees aware of these intrusion attempts? <\/li><li aria-level=\"1\">What compromises are possible from within your company (malicious employees, phishing, etc.)?<\/li><li aria-level=\"1\">Are your security teams\/tools capable of providing &#8220;real-time&#8221; detection and efficient response during an attack?<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8982adc e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"8982adc\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:400}\">\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-810e8d4 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"810e8d4\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Prerequisites for a Redteam mission<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-79bd4b6 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"79bd4b6\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>We recommend intrusion tests on your infrastructure applications and then on your internal network, to ensure a minimum level of security for your organization.<\/p><p>Once these services have been completed and your overall security level has been strengthened, starting a Redteam mission will enable you to put your cyber posture (solutions, organization, processes) and your security teams to the test.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-545b586 e-flex e-con-boxed e-con e-parent\" data-id=\"545b586\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-9c808ae e-con-full e-flex e-con e-child\" data-id=\"9c808ae\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-b4af5b2 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"b4af5b2\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:400}\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1e221da e-con-full e-flex e-con e-child\" data-id=\"1e221da\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-08372d3 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"08372d3\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Rely on a rigorous, proven approach<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6e73e5e elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"6e73e5e\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">The role of the sponsor<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-49975a2 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"49975a2\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5b9496a elementor-widget elementor-widget-text-editor\" data-id=\"5b9496a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><p>Redteam&#8217;s mission sponsor is the organization&#8217;s single point of contact during the service, and its role is to define :<\/p><ul><li aria-level=\"1\">Boundaries of the perimeter ;<\/li><li aria-level=\"1\">Sensitive targets ;<\/li><li aria-level=\"1\">Priority employees or those to be avoided during the phishing phase ;<\/li><li aria-level=\"1\">Premises targeted by physical intrusion attempts ;<\/li><li aria-level=\"1\">Authorized methods.<\/li><\/ul><p> <\/p><\/div><\/div><div class=\"elementor-element elementor-element-e5d009a elementor-widget elementor-widget-text-editor\" data-id=\"e5d009a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><p>Its aim is to determine the angles of attack that will highlight the sensitive points in the organization&#8217;s cybersecurity posture, by validating or proposing trophies.<\/p><p>In the event of a blockage during the service (e.g. due to the detection of security teams), he will be responsible for determining the next stage of the service:<\/p><\/div><div class=\"elementor-widget-container\"><ul><li aria-level=\"1\"><strong>Assumed breach&#8221; approach: this<\/strong> concerns the situation where the auditors encounter a blocking point when attempting to gain initial access to the Information System. The client may then propose the &#8220;voluntary&#8221; execution of a malicious attack, or VPN access to a first environment, in order to allow the mission to progress; <\/li><li aria-level=\"1\"><strong>Switch to Purple Team<\/strong>;<\/li><li aria-level=\"1\"><strong>End of performance<\/strong> and <strong>debriefing of trophies<\/strong> won.<\/li><\/ul><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8d5869c e-con-full e-flex e-con e-child\" data-id=\"8d5869c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-c7b9784 e-con-full e-flex e-con e-child\" data-id=\"c7b9784\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9bc2ae8 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"9bc2ae8\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">The striker's role<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1b19116 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"1b19116\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5b9496a elementor-widget elementor-widget-text-editor\" data-id=\"5b9496a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><p>The approach is different from the &#8220;classic&#8221; one: the auditor takes on the role of an attacker from outside the organization and, unlike a classic approach where he will attempt<b> as many tests as possible<\/b> in order to test the audited perimeter to the maximum, he will rely on stealth in order to achieve the defined trophies without raising alarms or suspicions from the security teams.<\/p><p>The attacker can then simulate an existing group of real attackers (LockBit, RansomHub, Scattered Spider&#8230;) using the same techniques, in order to assess the response of security tools\/teams. This simulation can be carried out using the MITRE ATT&#038;CK matrix, which references the techniques, tactics and procedures used by these attackers. <\/p><p>The RedTeam approach aims to simulate realistic (non-destructive) attacks, to thoroughly test the security of a given perimeter. This approach makes for greater efficiency and enables advanced attack scenarios to be carried out, combining logical intrusion with social engineering, phishing and more. <\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7f1939a e-con-full e-flex e-con e-child\" data-id=\"7f1939a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6194b8e e-con-full e-flex e-con e-child\" data-id=\"6194b8e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-a0ad2fc e-con-full e-flex e-con e-child\" data-id=\"a0ad2fc\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3d7c195 e-con-full e-flex e-con e-child\" data-id=\"3d7c195\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ef0faf2 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"ef0faf2\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Trophies<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0d645d7 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"0d645d7\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5b9496a elementor-widget elementor-widget-text-editor\" data-id=\"5b9496a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><div class=\"elementor-element elementor-element-0d86008 elementor-widget elementor-widget-text-editor\" data-id=\"0d86008\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><p>Red Teaming is <b>based on<\/b> predefined <b>trophies<\/b> agreed between the auditors and the customer.<\/p><p>These can be of various kinds:<\/p><ul><li aria-level=\"1\">Access to the back-office of an e-commerce site ;<\/li><li aria-level=\"1\">Access to a customer database ;<\/li><li aria-level=\"1\">CRM base infiltration ;<\/li><li aria-level=\"1\">Obtaining Domain Admin access ;<\/li><li aria-level=\"1\">AD compromise;<\/li><li aria-level=\"1\">Access to VIP messaging ;<\/li><li aria-level=\"1\">ERP access ;<\/li><li aria-level=\"1\">Access to a server room ;<\/li><li aria-level=\"1\">&#8230;<\/li><\/ul><p> <\/p><\/div><\/div><div class=\"elementor-element elementor-element-833637c elementor-widget elementor-widget-text-editor\" data-id=\"833637c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><p>These contextualized trophies<b>illustrate real risks<\/b> that could impact your organization. Winning these trophies validates feasibility, exposure and impact. <\/p><p>As a result, a Redteam approach is not destined to be the most exhaustive in terms of security tests against assets (unlike a &#8220;classic pentest&#8221;), but is geared towards a global, tactical and efficient compromise to get as close as possible to real attacks via trophies.<\/p><p>One of the objectives is also to define the impact of a real attack on an organization, and the cost of the associated measures.<\/p><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e9e2089 e-flex e-con-boxed e-con e-parent\" data-id=\"e9e2089\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bf84eff elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"bf84eff\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The different routes of intrusion<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7216104 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"7216104\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5b2dc85 elementor-widget elementor-widget-text-editor\" data-id=\"5b2dc85\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><p>As part of their Redteam missions, auditors may be required to use a variety of methods, including computer-based (logical intrusion), cognitive (social engineering) and physical (physical intrusion).<\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-90d3463 e-n-tabs-mobile elementor-invisible elementor-widget elementor-widget-n-tabs\" data-id=\"90d3463\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;tabs_justify_horizontal&quot;:&quot;start&quot;,&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400,&quot;horizontal_scroll&quot;:&quot;disable&quot;}\" data-widget_type=\"nested-tabs.default\">\n\t\t\t\t\t\t\t<div class=\"e-n-tabs\" data-widget-number=\"151860323\" aria-label=\"Tabs. Open items with Enter or Space, close with Escape and navigate using the Arrow keys.\">\n\t\t\t<div class=\"e-n-tabs-heading\" role=\"tablist\">\n\t\t\t\t\t<button id=\"e-n-tab-title-1518603231\" data-tab-title-id=\"e-n-tab-title-1518603231\" class=\"e-n-tab-title\" aria-selected=\"true\" data-tab-index=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"e-n-tab-content-1518603231\" style=\"--n-tabs-title-order: 1;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tLogic penetration testing\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1518603232\" data-tab-title-id=\"e-n-tab-title-1518603232\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1518603232\" style=\"--n-tabs-title-order: 2;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tSocial engineering campaigns\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1518603233\" data-tab-title-id=\"e-n-tab-title-1518603233\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1518603233\" style=\"--n-tabs-title-order: 3;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tPhysical intrusion testing\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t\t<\/div>\n\t\t\t<div class=\"e-n-tabs-content\">\n\t\t\t\t<div id=\"e-n-tab-content-1518603231\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1518603231\" data-tab-index=\"1\" style=\"--n-tabs-title-order: 1;\" class=\"e-active elementor-element elementor-element-8814f59 e-con-full e-flex e-con e-child\" data-id=\"8814f59\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-dfb29a4 e-flex e-con-boxed e-con e-child\" data-id=\"dfb29a4\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-25dfbf6 elementor-widget elementor-widget-text-editor\" data-id=\"25dfbf6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Mainly remote, this approach aims to identify the external perimeter of the Information System and exploit potential vulnerabilities to gain access to the organization&#8217;s internal network. There are several distinct phases: <\/p><ul><li aria-level=\"1\"><strong>Open-source intelligence phase<\/strong>, which focuses on gathering and analyzing information about the target organization in order to deduce a scope that will be validated and\/or refined as the mission progresses: physical sites, employees, partners, service providers, information leaks (internal reports, passwords, etc.), Information System (public addressing plan) ;<\/li><li aria-level=\"1\"><strong>Discovery phase of the external surface of<\/strong> the Information System, aimed at mapping the infrastructures accessible from the Internet: services exposed, technologies used, security equipment..;<\/li><li aria-level=\"1\">Based on the information obtained above, <strong>attempts<\/strong> will be made <strong>to compromise the<\/strong> organization&#8217;s <strong>external surface<\/strong> (exploitation of a vulnerable Web application, reuse of VPN identifiers, etc.). This initial access may enable lateral\/pivot movement to other environments; <\/li><li aria-level=\"1\">If an environment <strong>is actually compromised<\/strong>, it makes sense to<strong>establish persistence<\/strong> within it, in order to retain the access gained;<\/li><li aria-level=\"1\">During the <strong>post-exploitation phase<\/strong>, sensitive\/business data may be exfiltrated by auditors, particularly if they are the subject of a trophy.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1518603232\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1518603232\" data-tab-index=\"2\" style=\"--n-tabs-title-order: 2;\" class=\" elementor-element elementor-element-a81fb37 e-con-full e-flex e-con e-child\" data-id=\"a81fb37\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-568548c e-flex e-con-boxed e-con e-child\" data-id=\"568548c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-99cfd80 elementor-widget elementor-widget-text-editor\" data-id=\"99cfd80\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e734f74 elementor-widget elementor-widget-text-editor\" data-id=\"e734f74\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><p>This approach aims to exploit the human factor, often considered the weakest link in the Information System. To achieve this, two main methods can be used: <b>phishing <\/b>(e-mail attacks) and <b>vishing <\/b>(telephone call attacks): <\/p><p> <\/p><ul><li aria-level=\"1\"><strong>Profiling phase<\/strong>, to identify a list of people to target for the phishing campaign and gather as much information as possible to develop relevant scenarios;<br><br><\/li><li aria-level=\"1\"><strong>Definition of<\/strong> phishing campaign <strong>scenarios<\/strong> (e.g., sending an e-mail inviting the victim to visit a URL to enter his or her credentials, or to download a malicious file containing a backdoor);<br><br><\/li><li aria-level=\"1\"><strong>Campaign execution<\/strong>, typically :<ul><li aria-level=\"2\"><b>Phishing <\/b>: send e-mails, collect indicators (statistics on reception\/reading of e-mail\/opening of malicious link) and obtain access (backdoor or login).<\/li><li aria-level=\"2\"><b>Vishing:<\/b> making a call to execute a malicious attack, or to obtain credentials. The voice factor is used here to be more persuasive in some cases. <\/li><\/ul><\/li><\/ul><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1518603233\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1518603233\" data-tab-index=\"3\" style=\"--n-tabs-title-order: 3;\" class=\" elementor-element elementor-element-df4d4c8 e-con-full e-flex e-con e-child\" data-id=\"df4d4c8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-a197605 e-flex e-con-boxed e-con e-child\" data-id=\"a197605\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3d87ab0 elementor-widget elementor-widget-text-editor\" data-id=\"3d87ab0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e734f74 elementor-widget elementor-widget-text-editor\" data-id=\"e734f74\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><p>A physical intrusion test aims to gain access to the organization&#8217;s internal network by attempting to gain access to the organization&#8217;s premises (head office, subsidiary or industrial site, for example):<\/p><ul><li aria-level=\"1\"><strong>Reconnaissance phase<\/strong> <strong>:<\/strong> perimeter discovery of premises\/employees and positioning of access controls, photography of premises, identification of surrounding wireless networks and offensive tests against them, deposit of malicious USB keys, etc. ;<\/li><li aria-level=\"1\"><strong>Physical intrusion:<\/strong> bypassing access controls, manipulating employees, stealing\/copying badges;<\/li><li aria-level=\"1\"><strong>Depositing an implant <\/strong>on the internal network to obtain remote access (Wifi or 4G antenna), or using a &#8220;rubber ducky&#8221; key to rapidly execute a malicious load on a workstation;<\/li><li aria-level=\"1\"><strong>Offensive tests<\/strong> on the internal network.<\/li><\/ul><p>At the end of this exercise, which can last several weeks, the auditors will draw up a list of vulnerabilities, together with an action plan.  <\/p><p>We are committed to restoring the Information System to the state it was in before the start of the financial year.<\/p><p>Our Redteam methodology is described below (where phase 2 is carried out continuously throughout the service):<\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-47f0432 elementor-invisible elementor-widget elementor-widget-image\" data-id=\"47f0432\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"717\" height=\"1024\" src=\"https:\/\/www.synetis.com\/wp-content\/uploads\/2025\/12\/Methodologie_RedTeam_Synetis-1-717x1024.png\" class=\"attachment-large size-large wp-image-22291\" alt=\"\" srcset=\"https:\/\/www.synetis.com\/wp-content\/uploads\/2025\/12\/Methodologie_RedTeam_Synetis-1-717x1024.png 717w, https:\/\/www.synetis.com\/wp-content\/uploads\/2025\/12\/Methodologie_RedTeam_Synetis-1-210x300.png 210w, https:\/\/www.synetis.com\/wp-content\/uploads\/2025\/12\/Methodologie_RedTeam_Synetis-1-768x1097.png 768w, https:\/\/www.synetis.com\/wp-content\/uploads\/2025\/12\/Methodologie_RedTeam_Synetis-1-1075x1536.png 1075w, https:\/\/www.synetis.com\/wp-content\/uploads\/2025\/12\/Methodologie_RedTeam_Synetis-1.png 1400w\" sizes=\"(max-width: 717px) 100vw, 717px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">RedTeam mission methodology<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1d85b85 e-flex e-con-boxed e-con e-parent\" data-id=\"1d85b85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4c32780 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"4c32780\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What are the differences between BlueTeam and redTeam?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c333f12 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"c333f12\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1068843 elementor-widget elementor-widget-text-editor\" data-id=\"1068843\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><p>Unlike the RedTeam, <strong>the<\/strong> <strong>Blue Team is responsible for defending the organization&#8217;s systems and networks.<\/strong> Its role is to constantly monitor the IT environment, detect suspicious activity, respond to security incidents and implement preventive security measures. This function generally falls under the responsibility of a SOC (Security Operations Center) team. <\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f4aa3c8 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"f4aa3c8\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">The importance of collaboration between RedTeam and BlueTeam<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-813acb4 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"813acb4\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1068843 elementor-widget elementor-widget-text-editor\" data-id=\"1068843\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><div class=\"elementor-element elementor-element-1858d2c elementor-widget elementor-widget-text-editor\" data-id=\"1858d2c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><p>Although the Red Team and the Blue Team have distinct roles, their collaboration helps to improve the overall level of security of your Information System. The results of Red Teaming exercises provide the Blue Team with valuable information on security weaknesses and areas for improvement. In return, the Blue Team can provide the Red Team with information on the defensive systems in place, enabling the offensive team to improve the realism of its attack scenarios.  <\/p><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4c197e0 e-flex e-con-boxed e-con e-parent\" data-id=\"4c197e0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-94986c1 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"94986c1\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">PurpleTeam<\/h2>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ad49c20 e-con-full e-flex e-con e-child\" data-id=\"ad49c20\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-e4aefc3 e-con-full e-flex e-con e-child\" data-id=\"e4aefc3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ffd3fc4 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"ffd3fc4\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li aria-level=\"1\"><b>Red Team \/ Blue Team collaboration:<\/b> The Purple Team is an approach designed to maximize safety efficiency by fostering close, ongoing collaboration between the Red Team (offensive) and the Blue Team (defensive).<br><br><\/li><\/ul><ul><li aria-level=\"1\"><b>Knowledge sharing:<\/b> This encourages the sharing of information, techniques and strategies between the two teams. The Red Team communicates its attack methods to the Blue Team, while the Blue Team shares its knowledge of the defenses in place. <br><br><\/li><\/ul><ul><li aria-level=\"1\"><b>Continuous improvement<\/b> of Information System defenses, focusing on gaps in the system and exploiting recognized threat classification solutions (MITRE ATT&#038;CK \/ MITRE D3FEND).<br><br><\/li><\/ul><p>In conclusion, the Red Team mission is a crucial exercise for any organization wishing to put its information system to the test. By simulating realistic attacks, the <strong>Red Team highlights vulnerabilities and assesses the effectiveness of existing defenses<\/strong>. If you&#8217;d like to take action for your organization, contact the Synetis experts!  <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-413508c e-con-full e-flex e-con e-child\" data-id=\"413508c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;slideshow&quot;,&quot;background_slideshow_gallery&quot;:[{&quot;id&quot;:22297,&quot;url&quot;:&quot;https:\\\/\\\/www.synetis.com\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/opportunites-de-carriere.jpg&quot;}],&quot;background_slideshow_loop&quot;:&quot;yes&quot;,&quot;background_slideshow_slide_duration&quot;:5000,&quot;background_slideshow_slide_transition&quot;:&quot;fade&quot;,&quot;background_slideshow_transition_duration&quot;:500}\">\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2ba8f60 elementor-widget elementor-widget-menu-anchor\" data-id=\"2ba8f60\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"contact-audit\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7dc6fdc6 e-grid e-con-boxed e-con e-parent\" data-id=\"7dc6fdc6\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2a4917a e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"2a4917a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:400}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7d78e9bc elementor-widget elementor-widget-deensimc-animated-word-roller\" data-id=\"7d78e9bc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"deensimc-animated-word-roller.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"infinite-rotation-main-wrapper\">\n\t\t\t<h2 class=\"deensimc-infinite-rotation-container\">\n\t\t\t\t\t\t\t\t\t<span class=\"deensimc-fixed-text deensimc-infinite-rotation-heading\">\n\t\t\t\t\t\tAre you planning an audit?\t\t\t\t\t<\/span>\n\t\t\t\t\n\t\t\t\t<div class=\"deensimc-text-rotator-container\">\n\t\t\t\t\t<div class=\"deensimc-vertical-scroll-track\"\n\t\t\t\t\t\tdata-total-text=\"7\"\n\t\t\t\t\t\tdata-rotation-delay=\"3\"\n\t\t\t\t\t\tdata-visible-word=\"1\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"deensimc-rotate-text\">\n\t\t\t\t\t\t\t\t\t<div class=\"deensimc-rotating-word\">\n\t\t\t\t\t\t\t\t\t\tPentest\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"deensimc-rotate-text\">\n\t\t\t\t\t\t\t\t\t<div class=\"deensimc-rotating-word\">\n\t\t\t\t\t\t\t\t\t\tArchitecture\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"deensimc-rotate-text\">\n\t\t\t\t\t\t\t\t\t<div class=\"deensimc-rotating-word\">\n\t\t\t\t\t\t\t\t\t\tConfiguration\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"deensimc-rotate-text\">\n\t\t\t\t\t\t\t\t\t<div class=\"deensimc-rotating-word\">\n\t\t\t\t\t\t\t\t\t\tRed Team\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"deensimc-rotate-text\">\n\t\t\t\t\t\t\t\t\t<div class=\"deensimc-rotating-word\">\n\t\t\t\t\t\t\t\t\t\tSocial Engineering\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"deensimc-rotate-text\">\n\t\t\t\t\t\t\t\t\t<div class=\"deensimc-rotating-word\">\n\t\t\t\t\t\t\t\t\t\tOrganizational and Physical\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"deensimc-rotate-text\">\n\t\t\t\t\t\t\t\t\t<div class=\"deensimc-rotating-word\">\n\t\t\t\t\t\t\t\t\t\tSource code\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/h2>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<noscript>\n\t\t\t<div class=\"deensimc-noscript-notice\" role=\"note\">\n\t\t\t\tThis section requires JavaScript to load properly. Please enable JavaScript in your browser and reload the page.\t\t\t<\/div>\n\t\t<\/noscript>\n\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7b609836 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"7b609836\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:400}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-34ed4475 elementor-widget elementor-widget-hubspot-form\" data-id=\"34ed4475\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hubspot-form.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t\t\t\t<script>\n\t\t\t\t\t\t\twindow.hsFormsOnReady = window.hsFormsOnReady || [];\n\t\t\t\t\t\t\twindow.hsFormsOnReady.push(()=>{\n\t\t\t\t\t\t\t\thbspt.forms.create({\n\t\t\t\t\t\t\t\t\tportalId: 26643307,\n\t\t\t\t\t\t\t\t\tformId: \"a4591422-7cbd-429d-8f24-693ff8ce4b4a\",\n\t\t\t\t\t\t\t\t\ttarget: \"#hbspt-form-1778687845000-9355927513\",\n\t\t\t\t\t\t\t\t\tregion: \"eu1\",\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t})});\n\t\t\t\t\t\t<\/script>\n\t\t\t\t\t\t<div class=\"hbspt-form\" id=\"hbspt-form-1778687845000-9355927513\"><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>A RedTeam mission to simulate the behavior of an attacker in real conditions against your IS, as well as a PurpleTeam mission to train your BlueTeam team!<\/p>\n","protected":false},"author":7,"featured_media":0,"parent":22574,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"class_list":["post-22290","page","type-page","status-publish","hentry"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.synetis.com\/en\/wp-json\/wp\/v2\/pages\/22290","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.synetis.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.synetis.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.synetis.com\/en\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.synetis.com\/en\/wp-json\/wp\/v2\/comments?post=22290"}],"version-history":[{"count":5,"href":"https:\/\/www.synetis.com\/en\/wp-json\/wp\/v2\/pages\/22290\/revisions"}],"predecessor-version":[{"id":22324,"href":"https:\/\/www.synetis.com\/en\/wp-json\/wp\/v2\/pages\/22290\/revisions\/22324"}],"up":[{"embeddable":true,"href":"https:\/\/www.synetis.com\/en\/wp-json\/wp\/v2\/pages\/22574"}],"wp:attachment":[{"href":"https:\/\/www.synetis.com\/en\/wp-json\/wp\/v2\/media?parent=22290"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}