Skip to content
RedHunt
[ METHODOLOGY ]

How we run an engagement —
no black box.

Four principles. Six stages. Measurable framework coverage. Every engagement at RedHunt follows this spine, adapted to the layer under test.

> PRINCIPLES

Four things we never compromise.

Human-led, tool-assisted

Every engagement is run by a named senior operator. Automation is a multiplier, not a replacement.

Evidence over adjectives

Every finding is reproducible. PoC exploit, file:line, session log, screencast where relevant.

Framework-honest

Mapped to the frameworks your regulators, boards, and attackers all reference. No cherry-picking.

Your data, minimised

TLS 1.3, AES-256, regional residency, cryptographic wipe on handoff. Certificate of destruction on request.

> ENGAGEMENT STAGES

Six stages. Same spine across every service.

01

Scope

Assets, rules of engagement, safety rails, abort conditions — locked in writing before any payload touches your estate.

02

Recon

Passive + active mapping of your attack surface. Everything attackers would see; nothing they wouldn't.

03

Exploit

Adversary TTPs mapped to MITRE ATT&CK or ATLAS. Chained low-severity into critical narratives.

04

Post-Exploit

Lateral movement, privilege escalation, data-access proof. Stopped at pre-agreed blast radius.

05

Report

Executive heatmap + technical findings with reproducible PoC + exact remediation, not generic advice.

06

Retest

Free 60-day retest on every remediated finding. Closure evidence archived with the engagement record.

> FRAMEWORKS

Four frameworks. Zero cherry-picking.

Our test coverage spans the exact frameworks your regulators, boards, and attackers all reference.

> AI KILL CHAIN

7-phase AI red team lifecycle.

Adapted from classic kill-chain methodology, mapped to MITRE ATLAS TTPs and OWASP LLM Top 10 risks.

01
Recon
Asset discovery, model fingerprinting
02
Jailbreak
System-prompt bypass, role manipulation
03
Supply Chain
Dataset poisoning, model extraction
04
Agent Abuse
Tool misuse, privilege escalation via connectors
05
Post-Exploit
Data exfiltration, model theft
06
Reporting
Reproducible PoC prompts + AI-risk scoring
07
Retest
Closure validation, 60-day free
> COVERAGE AT A GLANCE

Honest numbers. No marketing rounding.

These figures represent our standard engagement scope. Exfiltration and destructive impact TTPs are excluded from most scopes by default and are available on request.

COVERED — tested in standard scope PARTIAL — tested in specific configurations OUT OF SCOPE — excluded from standard engagements
MITRE ATT&CK — ENTERPRISE

Infrastructure & Adversary TTPs

90%
coverage
standard scope

12 of 14 enterprise tactics fully covered. Exfiltration is tested within pre-agreed blast radius. Impact (destructive) techniques are excluded from most engagement scopes by default.

TA0043 ✓ COVERED

Reconnaissance

Active scanning, phishing, OSINT, credential collection

TA0042 ✓ COVERED

Resource Development

Acquire infrastructure, stage capabilities, establish accounts

TA0001 ✓ COVERED

Initial Access

Phishing, exploit public-facing app, valid accounts, supply chain

TA0002 ✓ COVERED

Execution

Command scripting, scheduled tasks, WMI, inter-process communication

TA0003 ✓ COVERED

Persistence

Boot/logon autostart, account manipulation, backdoors

TA0004 ✓ COVERED

Privilege Escalation

Kerberoasting, DACL abuse, token impersonation, sudo exploitation

TA0005 ✓ COVERED

Defense Evasion

EDR bypass, AMSI patching, obfuscation, living-off-the-land

TA0006 ✓ COVERED

Credential Access

LSASS dump, Kerberoasting, AS-REP roasting, credential spraying

TA0007 ✓ COVERED

Discovery

Network scanning, AD enumeration, process/file/system discovery

TA0008 ✓ COVERED

Lateral Movement

Pass-the-hash, Pass-the-ticket, WMIExec, RDP hijacking

TA0009 ✓ COVERED

Collection

Keylogging, screen capture, data staged from local/network sources

TA0011 ✓ COVERED

Command & Control

C2 frameworks, DNS tunneling, HTTPS beaconing, domain fronting

TA0010 ◐ PARTIAL

Exfiltration

Exfil over C2, web service, encrypted channels

TA0040 ○ OUT OF SCOPE

Impact

Data destruction, ransomware simulation, resource hijacking

✓ 12 covered ◐ 1 partial ○ 1 out of scope of 14 total
MITRE ATLAS — AI / ML

Adversarial Machine Learning TTPs

70%
coverage
standard scope

8 of 11 AI-specific tactics fully covered. Persistence via model backdoors is tested in research contexts. Defense Evasion (safety filter bypass) and Impact are excluded from standard scopes.

AML.TA0002 ✓ COVERED

Reconnaissance

AI system discovery, model versioning, API endpoint mapping

AML.TA0001 ✓ COVERED

Resource Development

Acquire shadow models, build attack datasets, staging infrastructure

AML.TA0007 ✓ COVERED

Initial Access

Prompt injection, LLM plugin exploitation, API abuse

AML.TA0000 ✓ COVERED

ML Attack Staging

Craft adversarial examples, jailbreak prompts, poisoned data prep

AML.TA0004 ✓ COVERED

Execution

Agentic tool invocation, plugin/connector abuse, code injection via LLM

AML.TA0005 ◐ PARTIAL

Persistence

Backdoored model weights, poisoned fine-tune datasets

AML.TA0006 ○ OUT OF SCOPE

Defense Evasion

Bypass safety classifiers, evade output filters, context manipulation

AML.TA0008 ✓ COVERED

Discovery

Model card extraction, hyperparameter inference, prompt reverse-eng

AML.TA0009 ✓ COVERED

Collection

Training data reconstruction, RAG document exfil

AML.TA0010 ✓ COVERED

Exfiltration

Model inversion, membership inference, system prompt extraction

AML.TA0003 ○ OUT OF SCOPE

Impact

Model DoS, denial of ML service, reputational damage via output

✓ 8 covered ◐ 1 partial ○ 2 out of scope of 11 total
OWASP LLM TOP 10 — 2025

Large Language Model Security

100%
coverage
standard scope

All 10 LLM risk categories tested on every AI engagement. No item is treated as out-of-scope by default — from prompt injection through unbounded consumption.

LLM01 ✓ COVERED

Prompt Injection

Direct & indirect injection, system prompt override, goal hijacking

LLM02 ✓ COVERED

Sensitive Information Disclosure

PII leakage, training data extraction, system prompt exposure

LLM03 ✓ COVERED

Supply Chain

Compromised model weights, poisoned plugins, malicious fine-tune data

LLM04 ✓ COVERED

Data & Model Poisoning

Training set contamination, backdoor implantation, label flipping

LLM05 ✓ COVERED

Insecure Output Handling

XSS via LLM output, code injection, SSRF through model-generated URLs

LLM06 ✓ COVERED

Excessive Agency

Overpermissioned agents, unintended tool invocation, action chaining

LLM07 ✓ COVERED

System Prompt Leakage

Extraction via manipulation, jailbreak, indirect context surfacing

LLM08 ✓ COVERED

Vector & Embedding Weaknesses

RAG injection, semantic search poisoning, embedding inversion

LLM09 ✓ COVERED

Misinformation

Hallucination exploitation, authority spoofing, false reasoning chains

LLM10 ✓ COVERED

Unbounded Consumption

Prompt flooding, model DoS, resource exhaustion via recursive calls

✓ 10 covered of 10 total
OWASP WEB APP TOP 10 — 2021

Web Application Security

100%
coverage
standard scope

All 10 web application risk categories are covered in every web application or API assessment. Business logic and design flaws are tested manually, not just automated.

A01 ✓ COVERED

Broken Access Control

IDOR, path traversal, CSRF, privilege escalation, CORS misconfig

A02 ✓ COVERED

Cryptographic Failures

Weak ciphers, cleartext transmission, hardcoded keys, insecure storage

A03 ✓ COVERED

Injection

SQLi, NoSQLi, OS command injection, SSTI, LDAP injection

A04 ✓ COVERED

Insecure Design

Missing security controls, business logic abuse, trust boundary violations

A05 ✓ COVERED

Security Misconfiguration

Default creds, exposed admin panels, verbose errors, missing hardening

A06 ✓ COVERED

Vulnerable & Outdated Components

CVE exploitation, dependency confusion, SCA analysis

A07 ✓ COVERED

Authentication & Identity Failures

Credential stuffing, MFA bypass, session fixation, JWT manipulation

A08 ✓ COVERED

Software & Data Integrity Failures

Insecure deserialization, unsigned updates, CI/CD pipeline attacks

A09 ✓ COVERED

Security Logging & Monitoring Failures

Log evasion, detection gap analysis, incident response readiness

A10 ✓ COVERED

Server-Side Request Forgery (SSRF)

Cloud metadata SSRF, blind SSRF, internal service pivoting

✓ 10 covered of 10 total
DELIVERABLE

See exactly what you receive.

Every finding is tagged to its ATT&CK or OWASP reference. Every remediation is exact. Every report is reproducible.