Blog

SiegeCast: Assumed Breach Part II

By Justin Connors | August 18, 2020

Click the link! https://redsiege.com/ab2 Welcome back to our next SiegeCast! On August 18th at 3pm EDT we will be presenting “ASSUMED BREACH PART II” As a continuation of “ASSUMED BREACH […]

Learn More
SiegeCast: Assumed Breach Part II

SiegeCast: Assumed Breach Part I

By Justin Connors | July 20, 2020

Click the link! https://redsiege.com/ab1 REGISTRATION IS OPEN! Welcome back to our next SiegeCast!  On July 28th at 3pm EDT we will be presenting “ASSUMED BREACH PART I” Traditional penetration testing […]

Learn More
SiegeCast: Assumed Breach Part I

SiegeCast: Be Your Enemy

By Justin Connors | June 23, 2020

Click the link! https://redsiege.com/be-your-enemy REGISTRATION IS OPEN! Welcome back to our next SiegeCast! We will be discussing how the blue team should embrace the skills of the red team! On […]

Learn More
SiegeCast: Be Your Enemy

SiegeCast: Access (Still) Granted

By Justin Connors | June 4, 2020

https://redsiege.com/access_still_granted *UPDATE* This event has passed and the video and transcript can be found at the bottom!  Red Siege is back with a brand new SiegeCast! This time we are […]

Learn More
SiegeCast: Access (Still) Granted

SiegeCast: Huge Needles, Small Haystack

By Justin Connors | May 11, 2020

https://redsiege.com/haystack *UPDATE This Event has passed and can be viewed below with the transcript!” Red Siege is proud to present its very first SiegeCast! We have been taking part in […]

Learn More
SiegeCast: Huge Needles, Small Haystack

User Enumeration Part 3 – Windows

By Mike Saunders | April 16, 2020

This is the third installment in a series of blogs on user enumeration. In Part 1 – Building Name Lists, I talked about ways of building usernames from OSINT and […]

Learn More
User Enumeration Part 3 – Windows

Recon Methods Part 5 – Traffic on the Target

By Red Siege | April 7, 2020

In the previous parts of this series, we looked at different ways to gather intelligence on a target without generating traffic on their hosts through manual processes and automated tools. […]

Learn More
Recon Methods Part 5 – Traffic on the Target

Recon Methods Part 4 – Automated OSINT

By Red Siege | April 1, 2020

In the first three parts of this series, we learned about manual methods for gathering intelligence about a target company, their external hosts, and their employees manually through a myriad […]

Learn More
Recon Methods Part 4 – Automated OSINT

Deceiving the Red Team with GPP

By Mike Saunders | March 24, 2020

A common tactic used by pen testers, “red teams”, and threat actors is searching for Group Policy Preference (GPP) files with usernames and passwords. These XML files, stored in the […]

Learn More
Deceiving the Red Team with GPP

User Enumeration Part 2 – Microsoft Office 365

By Mike Saunders | March 10, 2020

It’s not uncommon on external pen tests and red team engagements to find very little attack surface on the customer’s internet-facing networks. Customers have started shifting services to cloud providers, […]

Learn More
User Enumeration Part 2 – Microsoft Office 365