Business growth, digitalisation and the evolving threat landscape create constant security challenges for your organisation. Resec Systems Vulnerability Assessment & Penetration Testing service helps you to respond by identifying, classifying and addressing security risks and providing the ongoing support and guidance to best mitigate them.

Train your cyber security team to secure and defend your enterprise. Resec Systems Security Training will enhance your team’s operational skills and improve their ability to prevent, detect, and response to cyber attacks.

Assess your organisation’s threat detection and response capabilities with a simulated cyber-attack. A full-scope, multi-layered attack simulation designed to measure how well your people, networks, applications and physical security controls can withstand an attack from a real-life adversary.

Our Red Team Work


Test the effectiveness of your own security controls before threat actors do it for you. We are proud of ourselves on being unique–and we understand that your organization and its needs are unique too. Have a look at the research work done by our Red Team:


AV Evasion using Custom Reverse Meterpreter Shell

As part of our red team research we have created a custom payload which is capable of providing meterpreter shell. A simple meterpreter shell will get easily detected by the Antivirus but our custom payload is able to bypass BitDefender Total Security Antivirus.


Keylogger

This keylogger is part of research carried out by Red Team of Resec Systems to by pass endpoint detection and response (EDR) capabilities provided by Trend Micro's Apex One which also has managed detection and response (MDR) service option that boosts in-house teams with threat hunting and alert monitoring.

Making Known Malwares as Fully Undetectable

Major challenge faced by known malwares is that after some time they start getting detected by static detection of Antiviruses. Resec Systems Red Team took one of a known malware which was getting detected by the AVs and made it fully undetectable by apply some custom algorithms to it. In this video demonstration, a malware is able to bypass Windows Defender, McAfee Total Protection and BitDefender Total Security Antivirus.

Macro Malware

Macros are a powerful way to automate common tasks in Microsoft Office and can make people more productive. However, macro malware uses this functionality to infect your devices. Resec Systems Red team created a macro malware for understanding how macro malwares exploit the systems. As part of our red team research we created a POC to demonstrate that macros once enabled by enduser are capable to download an exe file from a remote server and execute it without the user actually knowing about it. This can eventually lead to compromise your computer systems.


A Custom Fully Undetected Bind Shell

Bind shell is a type of shell in which the target machine opens up a communication port or a listener on the victim machine and waits for an incoming connection. The attacker then connects to the victim machine’s listener which then leads to code or command execution on the server.