Huntress Acquires Inside Agent: A New Era for Identity ProtectionFree Trial
Menu
InvestorsCareersBlogAboutAcademySupportContact
LoginSign up
RED TEAMING · FULL KILL CHAIN · NATION-STATE TTPs · ZERO DETECTION TOLERANCE

Operate as the Threat.Break What DefendersBelieve Is Unbreakable.

Sustained, intelligence-driven red team operations that execute the complete adversary kill chain against your live environment — testing every control, every detection rule, and every human response under authentic attack conditions with zero advance notice.

Red Team Operations

Real adversary.
Real consequences.

Red teaming is not a compliance exercise. It is the only way to know whether your security programme would actually stop a motivated, intelligent adversary — before that adversary delivers the answer themselves.

Attack Vector Map
LIVE SIMINITIALISING
RTRed TeamOperatorPFPerimeterFirewallVPNVPNEndpointEGEmailGatewayADAD DomainControllerWSInternalHostsCJCrownJewels

Initialising operator environment…

BREACH PROGRESS0%
0hrs
Avg Time to Access
Mean time to initial foothold across all vectors
0%
Domain Admin Rate
Engagements where domain admin was fully achieved
0%
Exfil Undetected
Full red team ops where exfil went undetected
0
ATT&CK Tactics
MITRE ATT&CK tactics exercised per full engagement

Threat-Intelligence-Led

Every operation begins with an adversary profile built from current threat intelligence — replicating the exact actors targeting your sector, not a generic attack playbook or commodity scanner.

Zero-Notice Operations

The SOC operates completely blind. No advance warning, no excluded systems, no safety nets. Your defenders face the same information asymmetry they'd face against a real adversary.

Custom Tooling & Implants

Purpose-built C2 infrastructure, custom implants compiled per engagement with unique signatures, and OPSEC engineered to evade your specific security stack — not commodity tools your AV already detects.

Measurable Outcomes

Every action is logged, timestamped, and mapped to MITRE ATT&CK. You receive MTTD benchmarks per phase, control bypass documentation, an ATT&CK heatmap, and a risk-prioritised hardening roadmap.

Operator Credential Stack

Not consultants.
Operators.

Our red team is drawn from military cyber commands, national intelligence agencies, and elite offensive security research. Seven operators. Zero script kiddies. Every action taken by someone who has operated against real adversaries.

Team Background Distribution (7 operators, some multi-background)
Military / Intelligence Cyber Ops
6
National Intelligence Agency Alumni
4
Former Big-4 Red Team Lead
5
CVE Researcher / Exploit Developer
3
CBEST / TIBER-EU Lead Tester
4
Malware Analyst / Reverse Engineer
3
Security Clearance

Operators hold active SC / DV clearance (UK) or TS/SCI equivalent. Engagement evidence and operator communications can be handled at classified level where required.

Certifications Held Across Team
CREST CRT
CREST Certified Red Teamer
7/7
OSCP
Offensive Security Certified Professional
7/7
OSED
Offensive Security Exploit Developer
4/7
CRTE
Certified Red Team Expert (AD)
5/7
CRTO
Certified Red Team Operator
6/7
eCPTX
eLearnSecurity Certified PT eXtreme
3/7
GXPN
GIAC Exploit Researcher & Adv Pen Tester
3/7
OSEP
Offensive Security Experienced Pen Tester
5/7
Operational Tradecraft

Four phases.
One closed-loop operation.

Every phase produces structured outputs that feed directly into the next. Intelligence informs weaponisation. Operations generate evidence. Evidence drives hardening.

TC-01

Target Package Development

Intelligence analysts build a comprehensive target dossier — digital footprint mapping, employee targeting surfaces, vendor relationships, exposed infrastructure, and credential exposure across open and dark web sources. Output: a structured attack graph ranked by impact.

Operation Fidelity25%
Phase Intelligence
Digital Assets EnumeratedFull external footprint
Credential ExposureDark web + breach data
Attack Path RankingRisk-ranked by impact
Intelligence SourcesOSINT · Commercial · Dark Web
Engagement Types

Four engagement models.
One always fits your risk posture.

From fully unrestricted adversary simulation to regulatory-mandated CBEST and TIBER-EU engagements — each model is calibrated to a different risk profile, maturity level, and business objective.

Maximum Realism8–12 weeks

Full Red Team

Completely unrestricted adversary simulation. No scope limitations, no advance notice to SOC, no excluded systems. Operators attempt every realistic attack vector — physical, digital, and social — and pursue objectives until detected or until mission success.

ScopeFull estate — zero restrictions
SOC AwarenessNone — completely blind
VectorsDigital · Physical · Social Eng
C2 InfraCustom-built, purpose-discarded
OutputATT&CK heatmap + full report
Best For
Mature security programmes
Pre-M&A security validation
Critical infrastructure operators
Board-level assurance requirements
Start this engagement
MITRE ATT&CK Coverage

14 tactics.
Every one exercised.

Every red team operation covers the full MITRE ATT&CK kill chain. Green cells represent techniques exercised during a representative engagement — the remainder represent your untested blindspots.

Executed
Not Executed
TA0043

Reconnaissance

T1595
T1592
T1589
T1590
T1591
T1597
8/14
Tactics Exercised
38
Techniques Executed
7/7
MTTD Benchmarked
74%
Control Bypass Rate
Scope Architecture

Controlled realism.
No surprises.

A red team engagement is not a rogue operation. Scope is precisely defined, kill-switch authority is always active, and a small white team maintains full situational awareness throughout — without compromising blue team realism.

Engagement Team Structure
1
WHITE TEAM
CISO · 2 × Senior Security Leads

Full operation awareness. Approves scope, manages kill-switch, receives all operator communications. Never shares knowledge with blue team.

2
RED TEAM
Spakto Operator Team (3–5 operators)

Independent operation. No contact with client's IT/SOC. Builds custom tooling, executes full kill chain, documents everything in real-time.

3
BLUE TEAM / SOC
All Security Operations Staff

Completely blind. No awareness of engagement. Responds to detections (or fails to) exactly as they would under real attack. Actions logged by red team.

4
KILL-SWITCH PROTOCOL
White team + red team lead (24/7)

Immediate halt capability active at all times. Used if: real threat detected concurrently, business-critical system stability at risk, or white team exercises stop authority.

Standard Rules of Engagement
Physical IntrusionIN SCOPE
Social Engineering (Staff)IN SCOPE
Executive TargetingIN SCOPE
Destructive ActionsOUT OF SCOPE
Production DB ModificationOUT OF SCOPE
Third-party Cloud (non-scope)OUT OF SCOPE
DNS / BGP HijackingOUT OF SCOPE
DDoS / Availability ImpactOUT OF SCOPE
Evidence Standards

All operator actions are logged with timestamp, technique ID, target, and evidence screenshot. Logs are encrypted and delivered to the white team only. Blue team receives a sanitised version at debrief.

Red vs Blue Reality

What operators do.
What defenders miss.

This is not a theoretical comparison. These are representative findings from real engagements — the exact actions taken and the exact defensive gaps that allowed them to succeed.

Red Team Action

LinkedIn employee enumeration, crt.sh subdomain mapping, HaveIBeenPwned credential exposure analysis, Shodan infrastructure fingerprinting. Full attack surface constructed before day one.

Avg 340 unknown external assets per enterprise
Blue Team Reality

No continuous external exposure monitoring. Leaked credentials from 18-month-old breach still active. 47 forgotten subdomains hosting legacy services.

Defensive gap confirmed — detection did not fire
Engagement Intelligence

What the data says
about enterprise defences.

Aggregated findings across our red team programme. These are not vendor benchmarks — they are measured outcomes from live operations against enterprise security programmes in financial services, healthcare, and critical infrastructure.

Detection Rate by Kill Chain Phase
Reconnaissance
8%
Initial Access
22%
Execution
31%
Persistence
18%
Lateral Movement
25%
C&C
14%
Exfiltration
11%

Avg across all phases: 18.4% — meaning 81.6% of techniques executed go completely undetected by the target SOC.

Most Common Defensive Gaps Found
MFA not enforced on all access paths
78%
Unpatched internet-facing services
65%
Incomplete EDR coverage (servers/legacy)
52%
SIEM rules insufficient for ATT&CK tactics
71%
No crown-jewel access alerting
58%
DNS/HTTPS exfil not monitored
83%

Percentages represent the proportion of engagements where this gap was found and exploited. Based on enterprise engagements in FY2023–24.

Why Spakto

The difference is
operational.

Commodity red teams run tools. We run operations. The six differentiators below reflect what happens when you replace vendor scripts with human operators who have executed real-world offensive missions.

100%human-operated — no automation

True Adversary Fidelity

Every action is taken by a human operator who adapts to your defensive responses in real-time. We do not run scanners or scripts — we think like adversaries because our operators are former adversaries.

0%AV detection on custom implants

Custom Tooling Per Engagement

New C2 infrastructure and custom-compiled implants built from scratch for every engagement. Unique signatures, domain-fronted channels, and malleable HTTPS profiles make our traffic indistinguishable from legitimate enterprise traffic.

7+years avg operator experience

Operator Depth

Our operators hold CREST CRT, OSCP, OSED, and CRTE certifications and bring backgrounds from military cyber commands and national intelligence agencies — not just vendor training courses.

194ATT&CK techniques logged per op

Full ATT&CK Documentation

Every technique is logged against MITRE ATT&CK in real-time. You receive a precise technique-level heatmap of your detection gaps — not a summary paragraph.

40+detection rules per engagement

Detection Engineering Output

We don't just find gaps — we provide validated SIEM and EDR detection rules for every missed technique, tested against the actual techniques used during the operation.

3frameworks: CBEST, TIBER-EU, PTES

Regulatory Framework Delivery

Registered CBEST and TIBER-EU provider with proven delivery for UK and EU critical financial infrastructure regulators. We understand the mandated format, process, and oversight requirements.

Aligned standardsMITRE ATT&CKCBESTTIBER-EUPTESOSSTMMNIST SP 800-115ISO 27001
C2 Infrastructure Architecture

Nation-state grade
command and control.

Every engagement operates behind a custom-engineered C2 chain: stageless implants, rotating redirector VPS layers, CDN domain-fronting, and malleable HTTPS profiles indistinguishable from legitimate enterprise cloud traffic. Zero overlap with known C2 signatures.

C2 Signal Chain — Live
ENCRYPTED
IMPCustom ImplantVictim endpointREDRedirector Layer3× anonymous VPSCDNDomain FrontLegitimate CDN providerC2C2 ListenerOperator-controlled VPSOPSOperator ConsoleAir-gapped workstation
TLS 1.3 / Port 443
Encrypted — mimics Office 365 traffic
HTTP Domain Fronting
Masquerades as legitimate CDN request
Malleable C2 Profile
Custom HTTP headers + URI patterns
WireGuard Encrypted VPN
Operator-to-listener private tunnel
IMP
Custom Implant
Victim endpoint
Unique per-build signature
In-memory shellcode execution
AMSI + ETW bypass
Hollow process injection
Beacon Configuration
# Active profile — per-engagement unique
sleep:45 – 90 s · jitter 42%
channel:HTTPS → DNS-over-HTTPS fallback
profile:Malleable HTTP / custom headers
staging:Stageless — no outbound fetch
ttl:48 h kill-date post-operation
cleanup:All infra destroyed within 48 h
Detection signature: none
JA3 hash: spoofed to Firefox 112
Infrastructure lifespan
48h TTL

All VPS instances, domains, and certs destroyed within 48h of engagement conclusion. No persistent infra, no attributable footprint.

Purple Team Integration

Detection engineering
as a deliverable.

Red teaming without detection output is intelligence without action. Every technique executed becomes a validated SIEM or EDR rule delivered to your SOC team — with before/after ATT&CK coverage metrics that prove the improvement is real and measurable.

ATT&CK Detection Coverage — Before vs After
Before
After
Reconnaissance
8%42%+34pp
Initial Access
22%74%+52pp
Execution
31%69%+38pp
Persistence
18%57%+39pp
Priv Escalation
27%71%+44pp
Defense Evasion
12%48%+36pp
Credential Access
19%63%+44pp
Lateral Movement
25%68%+43pp
Exfiltration
11%51%+40pp
+43pp
Avg coverage uplift
40+
SIGMA rules delivered
<24h
Validation SLA
rule-delivery.log — live feed
IDTechniqueDetection RuleTarget
RT-001T1003.001LSASS Memory Access via OpenProcessdelivered
RT-002T1558.003Kerberoasting: SPN Request Spike >3/10sdelivered
RT-003T1059.001PowerShell Base64 Encoded Executiondelivered
RT-004T1071.004DNS Query Length Anomaly >50 charsdelivered
RT-005T1218.011RunDLL32 Spawning cmd.exe or powershellvalidated
RT-006T1484.001Group Policy Modification via LDAPvalidated
RT-007T1136.002Domain Account Created Off-Hourstesting
RT-008T1021.002Lateral Move via SMB ADMIN$ Sharepending
pipeline: active
0/8 delivered
Engagement Timeline

Ten weeks.
Adversary-paced precision.

Real adversaries do not rush. Our 10-week cadence mirrors the reconnaissance-heavy, evasion-conscious pace of a nation-state or organised crime group — giving your defenders the same slow, intelligent pressure needed to generate meaningful detection data.

01W1–2Intelligence Collection02W2–3Weaponisation03W3–7Operations Execution04W7–8Analysis &05W9–10Debrief &
01
Intelligence Collection
Duration: W1–2
External attack surface mapping
Employee credential exposure scan
Vendor & supply chain enumeration
Social engineering pretext development
DeliverableTarget Intelligence Package
Operations Focus
OSINTDark webcrt.shShodan
Phase Metrics
Operator hours8–12 h
ATT&CK techniques6
Deliverable SLA72 h
Engagement progress20%

Frequently Asked Questions

Frequently asked
questions.

Still have questions?
Our security engineers answer within one business day.
Ask a question