The client requested help in taking their current Red Team Business to the next level.
We performed a quick assessment of their Red Team Business.
It uncovered many gaps in their products and services.
Once we understood where they were at and where they wanted to go then we designed a plan.
And recommended an Exploit Development service and product that enhances their current business.
They wanted to have differed leadership operating the business but still maintain control…
Thus, the Exploit development business became a subsidiary of the Red Team company.
Context / Action
We Designed and Developed an Exploit Development Business.
This provided the parent Red Team company with advanced services and products on:
Intelligence on existing and emerging threats and development of customized scripts and software.
The business mission was to discover, analyze, and weaponize zero-day vulnerabilities. True sexy Black arts type of stuff…
The business utilized various types of testing for complied applications.
This allowed them to detect the types of complex faults and vulnerabilities…
Like the vulnerabilities that only emerges when a program is running. And interaction with external libraries and entities.
Testing services include but not limited to fault injection, fuzzing, binary code scanning and other static analysis methods…
Written reports generated as a customer product which details the following:
Affected products, versions, operating systems, and architectures;
Information on common configurations and product deployment;
Severity of the issue and privileges gained through successful exploitation;
A description of the vulnerable component or source code walk-through;
Thorough description on exploitation covering reliability, likelihood, and difficulty;
Breakdown of the network traffic for both an attack as well as legitimate data, how to mitigate risk of exposure before a patch;
A description of the included exploit and usage;
Network packet captures of both a malicious attack and benign traffic;
An advanced exploit of the flaw (note: not only a “proof of concept”);
Documentation discussing the exploit payload or other intricacies;
And an XML document for easy integration into SIEMs or other issue tracking software.
For exposure, we coordinated a multi-faceted digital marketing strategy.
The marketing strategy encompassed joint partnerships with other organizations:
US CERT, Army Red Teams/Penetration Testing Teams, and others.
This focused on knowledge share and exposure to vendors in the private sector.
And for remediation of the discovered issues.
Since they don’t use paid advertising.
The joint venture allowed the business to grow in organic means and gain traction fast.
The primary mechanism was Email Marketing.
After implementation, the client received several accolades from other businesses.
We developed the first proactive, bleeding-edge business of its kind in that space.
Which provided them the best return on investment (ROI).