Blog

Writing Strategy Guides to Defeating Cyber Security

By Red Siege | December 5, 2022

by Senior Security Consultant Douglas Berdeaux   The Almighty Strategy Guide to the Rescue!  With the end of the year approaching, I took some time to reflect on what the […]

Learn More
Writing Strategy Guides to Defeating Cyber Security

Introduction to Sliver

By Red Siege | November 7, 2022

By: Justin Palk, Security Consultant Around the time Tim decided he was going to give a Siegecast on selecting a C2, I finished building out a test Windows AD domain […]

Learn More
Introduction to Sliver

The power of adaptability through experience.

By Red Siege | November 3, 2022

By: Mike Saunders, Principal Security Consultant tldr: With experience comes the ability to adapt to challenges, and even experienced testers need to phone a friend now and then. In the […]

Learn More
The power of adaptability through experience.

Moving beyond T4 – Deconstructing Nmap Tuning

By Red Siege | July 6, 2022

by Alex Norman, Senior Security Consultant Nmap -T4 -iL targets.txt This is a very common scan string that many people use to get initial recon done on assessments and, to […]

Learn More
Moving beyond T4 – Deconstructing Nmap Tuning

Creating a Simple Windows Domain for Offensive Testing: Part 4

By Red Siege | June 23, 2022

By: Justin Palk, Security Consultant This is part four of my series of blog posts on creating a windows domain for offensive security testing. In part 1, I stood up […]

Learn More
Creating a Simple Windows Domain for Offensive Testing: Part 4

Creating a Simple Windows Domain for Offensive Testing: Part 3

By Red Siege | June 15, 2022

by Security Consultant Justin Palk Welcome back to my series on setting up a Windows domain for offensive testing. In the first two installments (Part 1, Part 2), I stood […]

Learn More
Creating a Simple Windows Domain for Offensive Testing: Part 3

Creating a Simple Windows Domain for Offensive Testing: Part 2

By Red Siege | June 7, 2022

By: Justin Palk, Security Consultant Welcome back to my series on setting up a Windows domain for offensive testing. In the first installment, I did my basic network setup, created […]

Learn More
Creating a Simple Windows Domain for Offensive Testing: Part 2

Creating a Simple Windows Domain for Offensive Testing : Part 1

By Red Siege | June 1, 2022

By: Justin Palk, Security Consultant While doing some tool development recently I realized that for the first time I was writing a tool specifically targeting an Active Directory domain and […]

Learn More
Creating a Simple Windows Domain for Offensive Testing : Part 1

SiegeCast: Practical People Hacking

By Justin Connors | April 25, 2022

  Social Engineering should be in the toolkit for every Security professional, whether that is to execute it, or defend against it. In this Siegecast Corey Overstreet and Jason Downey […]

Learn More
SiegeCast: Practical People Hacking

HTTPSC2DoneRight (and Working)

By Red Siege | February 17, 2022

tl;dr If you want an updated and working copy of httpsc2doneright, grab it here   If you’re a Cobalt Strike user, it’s almost certain that at some point you’ve used […]

Learn More
HTTPSC2DoneRight (and Working)