PurpleTeams offer a unique perspective to an in-house security teams in that it allows for direct feedback between the attackers and defenders. Each part is a test case driven assessment that progresses through all steps of an attack including phishing, privilege escalation, lateral movement, persistence, data theft, and more.
During each attack phase, our attackers will perform predetermined attack scenarios and work directly with security teams to if an attack was detected. If the attack wasn't detected, why and what needs to be implemented in order to enhance the chance of detecting the attack in the future