Common red team antipatterns

Antagonistic mindset

Problem: Treating blue team as the enemy, hiding findings to “win”, or mocking defensive failures.

Better: Red team exists to improve defences, not humiliate defenders. Collaboration produces better security than competition.

Over-reliance on automation

Problem: Running automated exploit frameworks without understanding what they do or considering operational security.

Better: Understand tools deeply. Know what network traffic they generate, what logs they create, how defenders might detect them.

Ignoring defensive wins

Problem: Only reporting successful attacks and ignoring effective defensive controls.

Better: Document what worked. If MFA blocked credential stuffing or EDR caught a payload, that’s valuable information proving security investments work.

Scope creep

Problem: Expanding testing beyond agreed boundaries because “we found something interesting.”

Better: Stay within scope rigidly. If you discover critical issues outside scope, follow the escalation process rather than investigating unauthorised systems.

Poor documentation

Problem: Incomplete notes, missing timestamps, inability to explain exactly what was done.

Better: Document obsessively. Blue team can’t learn from actions they can’t reconstruct.

Unrealistic operations

Problem: Using techniques real adversaries wouldn’t (massive network scans, obvious malware, loud exploitation).

Better: Match tradecraft to threat model. APT groups operate differently than ransomware gangs. Emulate the threats your organisation actually faces.