Red team services start out by gathering data - employees' info, network setup, APIs, breaches, and more. The team then strategizes to execute attacks through various methods and conducts penetration tests based on the above. Lastly, they deliver a comprehensive report detailing executed attacks, impacts, new vulnerabilities, and potential remedial actions.