Sans Core Netwars Tournament of Champions Europe

Sans Core Netwars Tournament of Champions Europe

By Red Siege | August 9, 2021

From Justin Palk, Security Consultant: I’ll be honest, it feels good to win. Popping a shell sends a shiver down my spine. But getting into a duel with another team […]

Learn More
Sans Core Netwars Tournament of Champions Europe

Hacking OAuth2.0

By Red Siege | March 22, 2021

The intent of this blog is to help penetration testers and security researchers get a deeper understanding of the OAuth protocol. We are going to learn how to bypass authentication […]

Learn More
Hacking OAuth2.0

Networking Fundamentals Part I

By Red Siege | February 10, 2021

This blog is the first of three in a series to go over some basic networking fundamentals that every security professional should know. These blogs are geared towards the absolute […]

Learn More
Networking Fundamentals Part I

Recon Methods Part 5 – Traffic on the Target

By Red Siege | April 7, 2020

In the previous parts of this series, we looked at different ways to gather intelligence on a target without generating traffic on their hosts through manual processes and automated tools. […]

Learn More
Recon Methods Part 5 – Traffic on the Target

Recon Methods Part 4 – Automated OSINT

By Red Siege | April 1, 2020

In the first three parts of this series, we learned about manual methods for gathering intelligence about a target company, their external hosts, and their employees manually through a myriad […]

Learn More
Recon Methods Part 4 – Automated OSINT

Recon Methods Part 3 – OSINT Employee Discovery

By Red Siege | February 27, 2020

In the first part of this series, we explored options we typically use to discover domain names, subdomains, available services on those hosts, historical data on the target, and indicators […]

Learn More
Recon Methods Part 3 – OSINT Employee Discovery

Recon Methods Part 2 – OSINT Host Discovery Continued

By Red Siege | February 19, 2020

In part 1, we discussed how to start with a target’s name and research a company’s history through Wikipedia, gain information about external hosts with DNSDumpster, and continue host discovery […]

Learn More
Recon Methods Part 2 – OSINT Host Discovery Continued

“I Want My EIP: Buffer Overflow 101” at NolaCon

By Red Siege | February 18, 2020

I Want My EIP: Buffer Overflow 101 Mike Saunders to Speak at NolaCon Red Siege Information Security Principal Consultant Mike Saunders will present “I Want My EIP: Buffer Overflow 101” […]

Learn More
“I Want My EIP: Buffer Overflow 101” at NolaCon

Hacking Dumberly Redux: More Dumberer at WWHF San Diego

By Red Siege | February 18, 2020

Hacking Dumber Redux: More Dumberer Tim Medin to Speak at Wild West Hacking Fest San Diego Red Siege Principal Consultant Tim Medin will present at 4pm Wednesday, March 11 at […]

Learn More
Hacking Dumberly Redux: More Dumberer at WWHF San Diego

Recon Methods Part 1 – OSINT Host Discovery

By Red Siege | February 4, 2020

During an external assessment (be it a penetration test or red team), we here at Red Siege begin by investigating the target as completely as possible before accessing the target’s […]

Learn More
Recon Methods Part 1 – OSINT Host Discovery