SiegeCast: Practical People Hacking
By Justin Connors | April 25, 2022
Social Engineering should be in the toolkit for every Security professional, whether that is to execute it, or defend against it. In this Siegecast Corey Overstreet and Jason Downey […]
Learn MoreAttacking SAML implementations
By Red Siege | November 2, 2021
SAML and SAML Attacks Recently a client mentioned that they wanted me to pay particular attention to the SAML authentication on an app I was going to be testing. It’s […]
Learn MoreSiegeCast: Properly Preparing for a Pentest
By Justin Connors | October 25, 2021
October 26th at 3pm Eastern. Defenders, we know you want to make sure you are getting the maximum value from your penetration test. On this SiegeCast, Senior Security Consultant Alex […]
Learn MoreSiegeCast: Cobalt Strike Basics
By Red Siege | September 13, 2021
Sept 14th at 3pm Eastern. Tim Medin breaks down everything you need to know about Cobalt Strike with its very own Tech Director, Joe Vest How to watch: Youtube: […]
Learn MoreBypassing Signature-Based AV
By Red Siege | August 25, 2021
If you want to execute arbitrary code on an endpoint during a penetration test, red team, or assumed breach, chances are you’ll have to evade some kind of antivirus solution. […]
Learn MoreSiegeCast: The Way of the Spray
By Red Siege | August 24, 2021
August 24th at 3pm Eastern. In a world where the security landscape is ever changing, weak passwords and an attackers ability to leverage that weakness is the gift that keeps […]
Learn MoreNow Streaming SiegeCasts!
By Red Siege | August 17, 2021
We are excited to bring you this brand new SiegeCast in a fresh new format! On August 24th at 3pm Eastern the new SiegeCast from Security Consultant Jason Downey will […]
Learn MoreSans Core Netwars Tournament of Champions Europe
By Red Siege | August 9, 2021
From Justin Palk, Security Consultant: I’ll be honest, it feels good to win. Popping a shell sends a shiver down my spine. But getting into a duel with another team […]
Learn MoreHacking OAuth2.0
By Red Siege | March 22, 2021
The intent of this blog is to help penetration testers and security researchers get a deeper understanding of the OAuth protocol. We are going to learn how to bypass authentication […]
Learn MoreNetworking Fundamentals Part I
By Red Siege | February 10, 2021
This blog is the first of three in a series to go over some basic networking fundamentals that every security professional should know. These blogs are geared towards the absolute […]
Learn More