Blog

Attacking SAML implementations

By Red Siege | November 2, 2021

SAML and SAML Attacks Recently a client mentioned that they wanted me to pay particular attention to the SAML authentication on an app I was going to be testing. It’s […]

Learn More
Attacking SAML implementations

SiegeCast: Properly Preparing for a Pentest

By Justin Connors | October 25, 2021

October 26th at 3pm Eastern. Defenders, we know you want to make sure you are getting the maximum value from your penetration test. On this SiegeCast, Senior Security Consultant Alex […]

Learn More
SiegeCast: Properly Preparing for a Pentest

SiegeCast: Cobalt Strike Basics

By Red Siege | September 13, 2021

Sept 14th at 3pm Eastern. Tim Medin breaks down everything you need to know about Cobalt Strike with its very own Tech Director, Joe Vest   How to watch: Youtube: […]

Learn More
SiegeCast: Cobalt Strike Basics

Bypassing Signature-Based AV

By Red Siege | August 25, 2021

If you want to execute arbitrary code on an endpoint during a penetration test, red team, or assumed breach, chances are you’ll have to evade some kind of antivirus solution. […]

Learn More
Bypassing Signature-Based AV

SiegeCast: The Way of the Spray

By Red Siege | August 24, 2021

August 24th at 3pm Eastern. In a world where the security landscape is ever changing, weak passwords and an attackers ability to leverage that weakness is the gift that keeps […]

Learn More
SiegeCast: The Way of the Spray

Now Streaming SiegeCasts!

By Red Siege | August 17, 2021

We are excited to bring you this brand new SiegeCast in a fresh new format!  On August 24th at 3pm Eastern the new SiegeCast from  Security Consultant Jason Downey will […]

Learn More
Now Streaming SiegeCasts!

Sans Core Netwars Tournament of Champions Europe

By Red Siege | August 9, 2021

From Justin Palk, Security Consultant: I’ll be honest, it feels good to win. Popping a shell sends a shiver down my spine. But getting into a duel with another team […]

Learn More
Sans Core Netwars Tournament of Champions Europe

Customizing C2Concealer – Part 2

By Red Siege | August 2, 2021

If you haven’t read Part I, we recommend starting there. If you’re ready for further C2Concealer customization, then let’s dive in.   The bulk of C2Concealer’s operations are done in […]

Learn More
Customizing C2Concealer – Part 2

Customizing C2Concealer – Part 1

By Red Siege | July 12, 2021

About a year ago, we publicly released our C2 malleable profile generator for Cobalt Strike, C2Concealer. You can read the initial blog post here. In the GitHub Readme page and […]

Learn More
Customizing C2Concealer – Part 1

Ordinal Values, Windows Functions, and C#

By Red Siege | June 8, 2021

There’s many different techniques that an offensive security professional could use to try to have their code avoid detection by various AV and EDR products. Various options include encrypting part […]

Learn More
Ordinal Values, Windows Functions, and C#