Red team and adversary simulation for Australian organisations
dotSec conducts collaborative red team exercises designed for organisations with mature security controls. Rather than black-box engagements that measure OPSEC skill rather than defensive capability, dotSec structures engagements as multi-stage exercises where offensive and defensive teams work iteratively to validate and improve detection and response. This produces more useful outcomes for organisations that have already invested in baseline security controls.
Why conventional red teaming often fails
In a mature environment, a black-box red team engagement typically produces one of two outcomes: the tester finds a gap the blue team already knows about, or the engagement spends most of its time demonstrating OSINT capability against LinkedIn and staff profiles. Neither outcome justifies the investment.
The problem is structural. Black-box red teaming measures how well the red team can evade detection, not how well the blue team can detect adversary behaviour. For organisations that have already implemented endpoint detection, centralised logging, and alert triage, this produces theatre rather than insight.
dotSec’s model is designed to stress-test specific controls, document detection boundaries, and produce calibrated findings that both red and blue teams can act on.
How dotSec structures a red team engagement
dotSec’s red team engagements are structured as multi-stage exercises with defined objectives at each stage. Stages currently delivered include:
- Email content filter bypass testing: iterative payload development and detection boundary mapping across email security controls.
- Assumed breach and EDR boundary testing: progressive payload capability testing to calibrate SOC detection thresholds under controlled conditions.
- Active Directory Certificate Services (ADCS) misconfiguration assessment: certificate template and identity trust assessment for exploitable weaknesses, aligned to SpecterOps Certified Pre-Owned research.
- Application whitelisting assessment: trusted path abuse, script interpreter gaps, and DLL loading weaknesses.
- Internal social engineering from legitimate account positions: simulates insider threat and post-compromise lateral movement, complementing dotSec’s social engineering and phishing exercises.
- AI and Copilot prompt injection: direct and indirect prompt injection testing aligned to the OWASP LLM Top 10 and MITRE ATLAS. See also dotSec’s dedicated AI penetration testing service.
- Data exfiltration testing: across multiple channels including email, cloud storage, DNS, and HTTP.
Each stage is scoped against your environment and objectives. Not all stages apply to every engagement.
Purple teaming and collaborative exercises
dotSec’s red team model operates as a purple team exercise. Each stage concludes with a findings review where red and blue teams compare timelines, review detection events, and document what was detected, what was missed, and where the detection threshold sits. The goal is calibration, not a surprise reveal.
This structure suits organisations that have been through conventional red teaming and found the outcomes limited. It directly supports blue team improvement and provides measurable evidence of what controls work and what needs attention. Findings are classified using MITRE ATT&CK technique references and reported with CVSS v4.0 severity ratings.
Organisations using this model as part of a maturity programme may also benefit from dotSec’s Essential Eight assessments and CIS 18 assessments, which provide a framework for measuring control effectiveness before and after red team exercises.
Custom tooling
dotSec develops its own payloads, proof-of-concept malware, and EDR evasion techniques in-house. Engagements do not rely on off-the-shelf commercial frameworks, which means detection signatures written for commodity tools do not apply.
Detection boundary mapping
The value of a red team engagement is not in proving a bypass exists but in documenting exactly where detection starts and stops. dotSec produces detection boundary maps that the blue team can use to prioritise alert development and control improvement.
ADCS and identity testing
Active Directory Certificate Services misconfigurations remain one of the most impactful attack paths in mature Windows environments. dotSec assesses certificate template configurations and identity trust relationships for exploitable weaknesses, aligned to current SpecterOps research on privilege escalation and persistence.
AI and Copilot testing
For organisations deploying Microsoft Copilot or other AI systems internally, dotSec tests whether prompt injection (direct and indirect) can surface data beyond intended access boundaries. Testing aligns to the OWASP LLM Top 10 and MITRE ATLAS, and complements dotSec’s dedicated AI penetration testing service.
Red team FAQ
What is the difference between red teaming and penetration testing?
A penetration test targets a defined scope and seeks to identify and exploit vulnerabilities within that scope. Red teaming is broader: it simulates a motivated attacker operating across the entire environment, using multiple attack vectors, with the goal of testing detection and response capability. dotSec’s red team engagements are structured as collaborative exercises to maximise the value of each stage.
Is red teaming only for large organisations?
Red teaming is most valuable for organisations that already have mature security controls and want to validate that those controls work under adversarial conditions. If an organisation has not yet conducted penetration testing or addressed basic hygiene (patching, MFA, endpoint protection), a penetration test is a more appropriate starting point. dotSec can advise on which approach suits your current maturity level.
How long does a red team engagement take?
Scope determines duration. A typical multi-stage collaborative exercise runs over several weeks to months, with stages conducted sequentially or in parallel where dependencies allow. Each stage concludes with a findings review before the next begins. dotSec will scope the engagement to match your objectives and budget.
What frameworks does dotSec align to?
Engagement methodology aligns to MITRE ATT&CK for technique classification, SpecterOps Certified Pre-Owned research for ADCS testing, OWASP LLM Top 10 and MITRE ATLAS for AI-related testing, and CISA red team advisory publications for scenario design. Findings are reported with CVSS v4.0 severity ratings.
What next?
If your organisation has mature security controls and wants to validate them under adversarial conditions, or if you have been through conventional red teaming and found the outcomes limited, dotSec can design an engagement that produces practical results. Contact us to discuss your objectives, or read about our penetration testing services as a starting point.
Premier australian cyber security specialists
ISO 27001 consulting
Practical and experienced Australian ISO 27001 and ISMS consulting services. We will help you to establish, implement and maintain an effective information security management system (ISMS).
Penetration tests
DotSec’s penetration tests are conducted by experienced, Australian testers who understand real-world attacks and secure-system development. Clear, actionable recommendations, every time.
PCI DSS
dotSec stands out among other PCI DSS companies in Australia: We are not only a PCI QSA company, we are a PCI DSS-compliant service provider so we have first-hand compliance experience.
WAF and app-sec
Web Application Firewalls (WAFs) are critical for protecting web applications and services, by inspecting and filtering out malicious requests before they reach your web servers
Identity management
Multi-Factor Authentication (MFA) and Single Sign-On (SSO) reduce password risks, simplify access, letting verified and authorised users reach sensitive systems, services and apps.
Vulnerability management
dotSec provides comprehensive vulnerability management services. As part of this service, we analyse findings in the context of your specific environment, priorities and threat landscape.
Phishing and soc eng
We don’t just test whether users will click a suspicious link — we also run exercises, simulating phishing attacks that are capable of bypassing multi-factor authentication (MFA) protections.
Penetration testing
DotSec’s penetration testing services help you identify and reduce technical security risks across your applications, cloud services and internal networks. Clear, actionable recommendations, every time!
Managed SOC/SIEM
dotSec has provided Australian managed SOC, SIEM and EDR services for 15 years. PCI DSS-compliant and ISO 27001-certified. Advanced log analytics, threat detection and expert investigation services.
Secure configuration
We provide prioritised, practical guidance on how to implement secure configurations properly. Choose from automated deployment via Intune for Windows, Ansible for Linux or Cloud Formation for AWS.
Secure cloud hosting
Secure web hosting is fundamental to protecting online assets and customer data. We have over a decade of AWS experience providing highly secure, scalable, and reliable cloud infrastructure.
Essential eight
DotSec helps organisations to benefit from the ACSC Essential Eight by assessing maturity levels, applying practical security controls, assessing compliance, and improving resilience against attacks.
CIS 18 Critical Controls
Evaluation against the CIS 18 Controls establishes a clear baseline for stakeholders, supporting evidence-based planning, budgeting, maturity-improvement and compliance decisions
Advisory services
We have over 25 years of cyber security experience, providing practical risk-based guidance, advisory and CISO services to a wide range of public and private organisations across Australia.