Security leaders face a recurring procurement question that sounds deceptively simple: should we run a penetration test or an adversary simulation? The two are frequently conflated in vendor conversations, RFPs, and even internal security roadmaps. But they are fundamentally different engagements with different scopes, methodologies, durations, and business outcomes.
Getting this decision wrong is expensive, not just in budget terms, but in the false confidence it can generate. A company that runs a scoped network penetration test and walks away thinking it has validated its detection and response capabilities has made a category error. Equally, a small business that commissions a full adversary simulation when it lacks the logging infrastructure to benefit from it has wasted resources.
This post breaks down both assessment types at a technical level, explains when each is appropriate, and helps you map the right engagement to your current security maturity.
Penetration testing is a structured, time-boxed security assessment in which a tester attempts to identify and exploit vulnerabilities within a defined scope. The scope might be an external network perimeter, a web application, a cloud environment, an internal network segment, or a specific set of systems.
The goal is to find exploitable weaknesses and demonstrate impact, typically through a written report that includes proof-of-concept evidence, CVSS scores, and remediation guidance.
### How a Penetration Test Actually Works
A standard external network penetration test begins with reconnaissance and enumeration. A tester using a tool like `nmap` combined with service fingerprinting scripts will build a map of exposed services.
nmap -sV -sC -p- --min-rate 5000 -oA external_scan 203.0.113.0/24[cta]
From there, discovered services are analyzed for known vulnerabilities. A tester might use `nuclei` with a curated template set to identify CVE-mapped issues across the attack surface.
nuclei -l live_hosts.txt -t cves/ -t exposures/ -severity critical,high -o nuclei_results.txt[cta]
Web application testing within a penetration test scope typically involves tools like Burp Suite Professional for manual and semi-automated vulnerability discovery, covering injection flaws, authentication bypass, insecure deserialization, and access control issues.
For internal network assessments, credential attacks and lateral movement are demonstrated using tools like CrackMapExec and Impacket to show how an attacker with initial access could escalate privileges and move through the network.
crackmapexec smb 10.10.10.0/24 -u administrator -H aad3b435b51404eeaad3b435b51404ee:bc1qugrtknpjz52vc4m559q7zumkc4268kp7skrsee --shares[cta]
python3 secretsdump.py -just-dc-ntlm domain.local/administrator@dc01.domain.local[cta]
The output from a penetration test is a findings report. It tells you what was vulnerable, how it was exploited, and how to fix it. What it does not tell you is how your security team would have responded if these actions had been taken by a real threat actor.
This is the critical distinction.
Adversary simulation, also referred to as red team operations or full-scope adversary emulation, goes significantly further. Rather than enumerating vulnerabilities across a defined scope, an adversary simulation replicates the tactics, techniques, and procedures (TTPs) of a specific threat actor or threat category relevant to your industry.
The scope is typically the entire organization. The engagement is not time-boxed to two weeks. It runs until realistic objectives are achieved, which might include reaching a target system, exfiltrating simulated sensitive data, or demonstrating persistent access to crown jewel assets.
Critically, the blue team (your internal security operations center or managed detection and response provider) is not informed. The simulation tests whether your people, processes, and technology can detect, contain, and respond to a real intrusion.
An adversary simulation team at Redfox Cybersecurity does not simply run scanners. Operators develop or adapt custom tooling to evade your specific defensive stack. Initial access is achieved through methods that mirror real threat actors, including spear-phishing with staged payloads, supply chain abuse scenarios, and exploitation of internet-facing applications.
A typical initial access payload in an adversary simulation is built to evade endpoint detection and response (EDR) tooling. This might involve a custom loader that injects shellcode into a benign process using indirect syscalls to bypass user-mode API hooks.
// Indirect syscall stub for NtAllocateVirtualMemory
// Bypasses EDR user-mode hooks by resolving syscall numbers at runtime
EXTERN_C NTSTATUS NtAllocateVirtualMemory(
HANDLE ProcessHandle,
PVOID *BaseAddress,
ULONG_PTR ZeroBits,
PSIZE_T RegionSize,
ULONG AllocationType,
ULONG Protect
);[cta]
Command and control (C2) infrastructure in an adversary simulation is purpose-built to blend with legitimate traffic. Rather than using default tooling profiles, operators configure C2 frameworks like Cobalt Strike or Brute Ratel C4 with malleable profiles that mimic the HTTP/S traffic patterns of known legitimate services.
# Cobalt Strike malleable C2 profile snippet mimicking Microsoft Teams traffic
set useragent "Mozilla/5.0 (Windows NT 10.0; Win64; x64) Teams/1.6.00.4472";
http-get {
set uri "/api/mt/beta/users/8:orgid/presenceSubscriptions";
client {
header "Accept" "application/json";
header "Origin" "https://teams.microsoft.com";
}
}[cta]
Post-exploitation activity is mapped to the MITRE ATT&CK framework. Operators document every TTP used, including process injection techniques (T1055), LSASS credential dumping (T1003.001), DCSync attacks (T1003.006), and persistence mechanisms such as scheduled tasks (T1053.005) or registry run key modifications (T1547.001).
The adversary simulation produces two deliverables. The first is a detailed red team report covering the full attack chain. The second, and arguably more valuable, is a detection gap analysis showing precisely which actions were visible to your security tooling and which were not. This directly informs your SIEM tuning, EDR configuration, and SOC playbook development.
Understanding where the two approaches diverge helps you apply the right one to your situation.
Penetration testing operates within a defined and agreed scope. The tester knows which IP ranges, applications, or systems are in scope. The objective is vulnerability discovery and exploitation proof.
Adversary simulation operates with a mission objective, not a technical scope. The objective might be "reach the finance database" or "obtain persistent access to the OT network." Everything required to achieve that objective is fair game, including people (through social engineering) and physical security if agreed upon.
A penetration test typically runs one to three weeks depending on scope. An adversary simulation runs anywhere from four weeks to several months, depending on the complexity of the target environment and the sophistication of the threat actor being emulated.
In penetration testing, the security team is usually informed that a test is occurring. In a full adversary simulation, the blue team operates without knowledge of the engagement. This is intentional: it tests real detection capabilities under realistic conditions, not sanitized ones.
A penetration test produces a vulnerability report with remediation priorities. An adversary simulation produces an attack chain narrative, a TTP mapping to MITRE ATT&CK, and a detection coverage assessment. The latter directly feeds into your security program improvement roadmap.
Penetration testing is the right choice in a specific set of circumstances.
You have compliance obligations that require it. PCI DSS 11.4, ISO 27001 Annex A controls, and SOC 2 Type II engagements commonly require documented penetration testing results. Regulatory bodies want evidence that you have tested your controls, and a penetration test satisfies that requirement.
You have deployed new infrastructure or a new application and need to validate that it is not carrying exploitable vulnerabilities before it reaches production or before a major commercial launch.
You are a small or medium-sized business that has not yet established a mature security monitoring capability. Running an adversary simulation when you have limited logging and no SOC means you will not be able to leverage the most valuable part of the output, which is the detection gap analysis. Build the foundation first.
You need to validate a specific control or a specific attack vector. A targeted penetration test against your Active Directory environment, your cloud IAM configuration, or your external attack surface provides focused, actionable findings without the overhead of a full red team engagement.
If you are at this stage of your security maturity, Redfox Cybersecurity's penetration testing services are scoped to deliver maximum technical depth within a defined boundary, with findings that map directly to your remediation backlog.
Adversary simulation becomes the appropriate engagement when your organization has moved beyond the "find and fix" stage of security maturity.
You have a functioning SOC or MDR provider, SIEM with tuned detection rules, and EDR deployed across your endpoint fleet. You have run penetration tests before and your teams remediate findings consistently. The question is no longer "are we vulnerable?" It is "can we detect and respond to a skilled attacker before they reach their objective?"
You operate in a high-risk industry. Financial services, critical infrastructure, healthcare, and defense contractors face sophisticated, targeted threat actors. Nation-state groups and organized financially motivated attackers do not use commodity techniques. Testing your defenses against commodity techniques is not adequate preparation.
You want to validate a specific threat actor profile. An adversary simulation can be scoped to emulate the TTPs of a specific group, such as those documented in MITRE ATT&CK group profiles. For an energy sector company, emulating TTPs associated with ICS-targeting threat actors provides directly relevant assurance.
You have invested heavily in your security stack and want to know whether that investment is delivering detection coverage. Adversary simulation provides empirical evidence of where your controls work and where they do not.
A full adversary simulation with Redfox Cybersecurity is designed to give your security leadership an honest answer to the hardest question in security: if a capable threat actor targeted us today, how far would they get and how quickly would we know?
There is a middle ground worth understanding: purple team exercises. A purple team engagement combines red team operators and blue team defenders working collaboratively in real time. Rather than running a covert simulation, the red team executes specific TTPs while the blue team attempts to detect them. Gaps are identified and addressed immediately, with detection rules written and validated during the engagement itself.
Purple teaming is particularly valuable for organizations that want to accelerate their detection engineering maturity without the full overhead of a covert adversary simulation. It is also an excellent option following a penetration test, when you want to validate that the vulnerabilities identified have been remediated and that your monitoring would catch exploitation attempts.
# Example Sigma rule developed during a purple team exercise
# Detects DCSync attack pattern via directory replication service calls
title: DCSync Attack via Directory Replication
status: experimental
description: Detects replication of directory service credentials via DRSUAPI
logsource:
product: windows
service: security
detection:
selection:
EventID: 4662
ObjectType: '%{19195a5b-6da0-11d0-afd3-00c04fd930c9}'
AccessMask: '0x100'
Properties|contains:
- '1131f6aa-9c07-11d1-f79f-00c04fc2dcd2'
- '1131f6ad-9c07-11d1-f79f-00c04fc2dcd2'
filter:
SubjectUserName|endswith: '$'
condition: selection and not filter
falsepositives:
- Legitimate Active Directory replication from domain controllers
level: high
tags:
- attack.credential_access
- attack.t1003.006[cta]
Most mature security programs do not choose between penetration testing and adversary simulation permanently. They build a roadmap that sequences both appropriately.
Year one for many organizations focuses on establishing a baseline through comprehensive penetration testing across their most critical attack surfaces: external perimeter, internal network, key web applications, and cloud environments. Findings are remediated and re-tested.
Year two introduces purple team exercises to validate detection capabilities and accelerate SOC maturity. Detection rules are built and tuned. Incident response playbooks are exercised.
Year three, once monitoring and response capabilities are established, is when a full adversary simulation delivers its maximum value. You now have the logging fidelity and team capability to extract actionable insight from the detection gap analysis.
This sequencing approach means every assessment builds on the last, and your security investment compounds rather than being spent on assessments that outpace your current capability to act on the findings.
Penetration testing and adversary simulation are not competing products. They are complementary tools that serve different purposes at different stages of security maturity. The decision between them should be driven by what your organization actually needs to learn, not by what sounds more impressive in a board presentation.
If you need to find and fix vulnerabilities, validate compliance controls, or test a specific system, penetration testing is the right tool. If you need to know whether your detection and response capabilities will hold against a real, capable attacker targeting your organization specifically, adversary simulation is the engagement you need.
The most important step is being honest about where your program is today, and choosing the assessment that will generate findings you are actually positioned to act on.
Redfox Cybersecurity works with organizations across both engagement types, helping security leaders select the right assessment for their current maturity level and building the roadmap to get the most from every engagement.