Securing your business-critical assets and operations requires more than traditional protective measures; it requires seeing your organization the way an adversary does. This collection of offensive security use cases illustrates how organizations across critical sectors, like Government, Finance, and Healthcare, are doing exactly that. The industries differ, but there is a shared need to test defenses, understand where real-world attackers could break in, how far they could go, and what safeguards must evolve to stay ahead. 

Red Teaming Use Cases

These examples of Red Team engagements and penetration tests reveal how offensive testing teams can uncover gaps in your detection and response as well as potential attack paths. 

Use Case: Government Agency

A government agency responsible for critical public services commissions a Red Team engagement to assess its cybersecurity resilience. The exercise simulates an advanced persistent threat (APT) attack, testing the agency’s ability to detect, respond to, and mitigate cyber threats targeting sensitive government data, public infrastructure, and national security. 

Phase 1: Initial Access Operations
Phase 2: Lateral Movement & Privilege Escalation
Phase 3: Maintaining Persistence & Evasion
Phase 4: Simulated Attack Scenarios
Phase 5: Red Team Engagement & Blue Team Training

Outcome & Lessons Learned 

  • Identified Weaknesses: The exercise exposes vulnerabilities in third-party services, endpoint security, and insider threat detection. 
  • Security Improvements: The agency implements zero-trust architecture, network segmentation, and continuous security monitoring. 
  • Enhanced Cyber Resilience: The agency adopts a proactive security strategy, conducting regular Red Team engagements to safeguard national security assets. 

Use Case: Financial Institution

A large financial institution conducts an assumed breach exercise to test its cybersecurity resilience. The Red Team is tasked with simulating an advanced persistent threat (APT) attack, while the Blue Team monitors, detects, and mitigates threats in real-time. 

Phase 1: Initial Access Operations
Phase 2: Lateral Movement & Credential Harvesting
Phase 3: Maintaining Persistence
Phase 4: Actions on Targets
Phase 5: Red Team Engagement & Purple Teaming

Outcome & Lessons Learned 

  • Identified Gaps: The exercise reveals weaknesses in the Financial Institution’s email filtering, endpoint detection, and privilege management. 
  • Security Enhancements: Multi-factor authentication (MFA), stricter browser security policies, and improved lateral movement detection are implemented. 
  • Continuous Improvement: The organization adopts a proactive security strategy, conducting regular assumed breach exercises to stay ahead of emerging threats. 

Use Case: Hospital Network

A regional hospital network conducts a Red Team engagement to evaluate its cybersecurity defenses. The exercise aims to simulate a sophisticated cyberattack targeting patient data, medical devices, and critical infrastructure, testing the hospital’s ability to detect, respond to, and recover from an intrusion. 

Phase 1: Initial Access Operations
Phase 2: Lateral Movement & Privilege Escalation
Phase 3: Maintaining Persistence & Evasion
Phase 4: Targeted Attack Scenarios
Phase 5: Red Team Engagement & Blue Team Training

Outcome & Lessons Learned

  • Identified Weaknesses: Gaps in third-party security, endpoint detection, and network segmentation were exposed. 
  • Security Improvements The hospital network implements multi-factor authentication (MFA), network segmentation, and enhanced monitoring for medical devices. 
  • Enhanced Preparedness: The hospital now conducts regular Red Team engagements to maintain a proactive security strategy. 

Get a Personalized Cobalt Strike Demo

See how red teams use its flexible adversary‑simulation capabilities—like Beacon, Malleable C2, and the Arsenal Kit—to mirror real‑world attacker behaviors. This live walkthrough gives you the chance to explore features relevant to your environment and ask questions in real time.

Pen Testing Use Cases

While Red Team engagements take a broad approach, emulating real adversaries to test an organization’s detection, response and resilience, penetration tests focus on identifying and validating specific vulnerabilities in defined systems. Both testing types serve important roles and are often used together as part of an offensive security strategy.  

Use Case: Government Agency

A national government agency operates a secure web platform for delivering citizen services such as benefits applications, licensing, and tax filings. The agency wants to proactively identify weaknesses in its public-facing and internal systems before they can be exploited by hostile actors.

Phase 1: Planning and Reconnaissance
Phase 2: Scanning
Phase 3: Gaining Access
Phase 4: Maintaining Access
Phase 5: Reporting

Outcome & Lessons Learned

This government agency had several objectives in mind when deciding to perform a penetration test. They included: 

  • Demonstrating Regulatory Compliance: Standards like NIST 800-53 and FISMA both require pen testing as a mandatory security control for federal agencies. 
  • Improve Citizen Trust: Publicizing the fact that they perform regular, third-party penetration tests earns them the trust of the public and increases the number of citizens likely to interact with that agency’s services.  
  • Harden Defenses Against Both Nation-State and Cybercriminal Threats: Unpatched vulnerabilities are an open invitation to sophisticated nation-state actors who can do a lot with these easy entry points. 

Use Case: Financial Institution

A major retail bank relies on a cloud-hosted customer banking portal and an internally developed mobile app for millions of customers worldwide. The bank wants to ensure these systems are resistant to real-world cyberattacks that could compromise customer data, disrupt transactions, or damage trust. 

Phase 1: Planning and Reconnaissance
Phase 2: Scanning
Phase 3: Gaining Access
Phase 4: Maintaining Access
Phase 5: Reporting

Outcome & Lessons Learned 

At the outset, the retail bank commissioned the penetration testing report with several objectives in mind. 

  • Identify Exploitable Vulnerabilities Before Threat Actors Do: By the time financially motivated attackers probe the bank’s website, app, or customer portal, it is already too late. Pen testing lets the financial institution experience this same level of awareness within a safe setting and with time to spare. 
  • Ensure Compliance With PCI DSS, FFIEC Guidance, and Internal Risk Controls: Increasingly, compliance mandates require penetration testing as a necessary security measure to test defenses and reduce risk within the financial sector.  

After receiving the pen testing report, the bank understands key areas of concern within the network, its end-users, and its mobile application that could jeopardize these objectives. 

Use Case: Hospital Network

A major hospital system relies on a complex digital ecosystem—including a patient portal, Electronic Health Records (EHR), IoTconnected medical devices, and an internal clinical network—to support daily operations and patient care. With rising cyber threats targeting healthcare environments, the hospital needed a way to continuously assess weaknesses without disrupting clinical workflows.

Phase 1: Planning & Reconnaissance
Phase 2: Scanning
Phase 3: Gaining Access (Exploitation)
Phase 4: Lateral Movement & Post-Exploitation
Phase 5: Reporting & Remediation

Outcome & Lessons Learned

At the outset, the hospital launched automated penetration testing to strengthen security and reduce risk across patientcare systems. 

  • Identify Critical Vulnerabilities Before Attackers Could: Testing uncovered several high impact weaknesses— including outdated WiFi firmware vulnerable to remote code execution, hardcoded credentials on medical imaging systems, and misconfigured file permissions exposing PHI— giving the hospital early visibility into threats that could jeopardize operations and data privacy. 
  • Support Compliance With HIPAA, NIST, and Internal Controls: Automated testing, enhanced through Core Impact, enabled continuous, scalable assessments, early detection of vulnerabilities across EHR, IoT, and network assets, and streamlined verification of remediation efforts to meet healthcare security standards. 
  • Clarify Key Areas of Concern Across Clinical and Network Systems: With clear findings and compliance ready reports, the hospital improved its cybersecurity posture and established a recurring testing schedule to ensure ongoing risk reduction and operational resilience.