SiegeCast: Assumed Breach Part II
By Justin Connors | August 18, 2020
Click the link! https://redsiege.com/ab2 Welcome back to our next SiegeCast! On August 18th at 3pm EDT we will be presenting “ASSUMED BREACH PART II” As a continuation of “ASSUMED BREACH […]
Learn MoreSiegeCast: Assumed Breach Part I
By Justin Connors | July 20, 2020
Click the link! https://redsiege.com/ab1 REGISTRATION IS OPEN! Welcome back to our next SiegeCast! On July 28th at 3pm EDT we will be presenting “ASSUMED BREACH PART I” Traditional penetration testing […]
Learn MoreSiegeCast: Be Your Enemy
By Justin Connors | June 23, 2020
Click the link! https://redsiege.com/be-your-enemy REGISTRATION IS OPEN! Welcome back to our next SiegeCast! We will be discussing how the blue team should embrace the skills of the red team! On […]
Learn MoreSiegeCast: Access (Still) Granted
By Justin Connors | June 4, 2020
https://redsiege.com/access_still_granted *UPDATE* This event has passed and the video and transcript can be found at the bottom! Red Siege is back with a brand new SiegeCast! This time we are […]
Learn MoreSiegeCast: Huge Needles, Small Haystack
By Justin Connors | May 11, 2020
https://redsiege.com/haystack *UPDATE This Event has passed and can be viewed below with the transcript!” Red Siege is proud to present its very first SiegeCast! We have been taking part in […]
Learn MoreUser Enumeration Part 3 – Windows
By Mike Saunders | April 16, 2020
This is the third installment in a series of blogs on user enumeration. In Part 1 – Building Name Lists, I talked about ways of building usernames from OSINT and […]
Learn MoreRecon Methods Part 5 – Traffic on the Target
By Red Siege | April 7, 2020
In the previous parts of this series, we looked at different ways to gather intelligence on a target without generating traffic on their hosts through manual processes and automated tools. […]
Learn MoreRecon Methods Part 4 – Automated OSINT
By Red Siege | April 1, 2020
In the first three parts of this series, we learned about manual methods for gathering intelligence about a target company, their external hosts, and their employees manually through a myriad […]
Learn MoreDeceiving the Red Team with GPP
By Mike Saunders | March 24, 2020
A common tactic used by pen testers, “red teams”, and threat actors is searching for Group Policy Preference (GPP) files with usernames and passwords. These XML files, stored in the […]
Learn MoreUser Enumeration Part 2 – Microsoft Office 365
By Mike Saunders | March 10, 2020
It’s not uncommon on external pen tests and red team engagements to find very little attack surface on the customer’s internet-facing networks. Customers have started shifting services to cloud providers, […]
Learn More