Threading the Needles: Why Defense in Depth Still Matters
By Mike Saunders | January 6, 2021
I recently performed an assumed breach test against what I would consider an Apex Defender organization. The security team is smart, well-funded, extremely capable, and resourceful. The team has both […]
Learn MoreNetcat and MFD’s – The Gifts That Keep on Giving
By Mike Saunders | October 30, 2020
It’s fairly well known that printers and MFDs can be a gateway to compromise on otherwise secured networks. We regularly encounter networks filled with these devices internal tests and (ab)use […]
Learn MoreUser Enumeration Part 3 – Windows
By Mike Saunders | April 16, 2020
This is the third installment in a series of blogs on user enumeration. In Part 1 – Building Name Lists, I talked about ways of building usernames from OSINT and […]
Learn MoreDeceiving the Red Team with GPP
By Mike Saunders | March 24, 2020
A common tactic used by pen testers, “red teams”, and threat actors is searching for Group Policy Preference (GPP) files with usernames and passwords. These XML files, stored in the […]
Learn MoreUser Enumeration Part 2 – Microsoft Office 365
By Mike Saunders | March 10, 2020
It’s not uncommon on external pen tests and red team engagements to find very little attack surface on the customer’s internet-facing networks. Customers have started shifting services to cloud providers, […]
Learn MoreUser Enumeration Part 1 – Building Name Lists
By Mike Saunders | January 30, 2020
A common part of pen tests – both network and web app – is password spraying. In order to do that, you need usernames. But how do you find out […]
Learn MoreLessons Learned in Password Cracking
By Mike Saunders | January 16, 2020
In many tests, we end up having to do some kind of password cracking, Kerberoasted hashes, hashes dumped from the SAM or ntds.dit, or some other kind of hash. When […]
Learn MoreBreaking into Infosec
By Mike Saunders | May 7, 2019
tl/dr; There are a lot of ways to get into infosec. I’ll try to outline some of the things that have helped me along the way and provide some resources […]
Learn MoreFinding the silver lining in getting your teeth kicked in
By Mike Saunders | March 27, 2019
Lots of pen test and red team blogs follow the same model: we came, we saw, we conquered, blue team tears flowed. This is not one of those blogs. TL/DR; […]
Learn MoreSQLi Data Exfiltration via DNS
By Mike Saunders | November 30, 2018
Did you know you can use DNS queries to exfiltrate data from a database via SQLi? No? Then continue reading! I’ll walk through some techniques you can use to enumerate […]
Learn More