Red Team will try to get as much information about the target as they can. This may also include the personal details of the company employees but not limited to the Networks, Apps and other infrastructure of the target.
After getting enough information about the target, red team will start a comprehensive pentest, to identify all types of vulnerabilities in the company's IT infrastructure.
Red Team will launch comprehensive phishing compaings by chaining the vulnerabilities identified before to get the maximum from the phishing or vishing compaingn.
Once red team has got the initial access to company's IT infrastructure, they will try to exploit other vulnerabilities to get much more deeper into the target.
Now red team will try to escalate their privileges to gain admin access to any of the company's system/server. Once they have got the admin access they will try to get admin domain and so on.
Once the desired goal is acheived, red team will prepare a comprehensive report about their red teaming activity. They will mention the complete story of the red teaming activity.