Blog

Hacking OAuth2.0

By Red Siege | March 22, 2021

The intent of this blog is to help penetration testers and security researchers get a deeper understanding of the OAuth protocol. We are going to learn how to bypass authentication […]

Learn More
Hacking OAuth2.0

Networking Fundamentals Part I

By Red Siege | February 10, 2021

This blog is the first of three in a series to go over some basic networking fundamentals that every security professional should know. These blogs are geared towards the absolute […]

Learn More
Networking Fundamentals Part I

SiegeCast : Web Api Weaknesses

By Justin Connors | January 11, 2021

Learn More
SiegeCast : Web Api Weaknesses

Threading the Needles: Why Defense in Depth Still Matters

By Mike Saunders | January 6, 2021

I recently performed an assumed breach test against what I would consider an Apex Defender organization. The security team is smart, well-funded, extremely capable, and resourceful. The team has both […]

Learn More
Threading the Needles: Why Defense in Depth Still Matters

Free Backgrounds for Everyone!

By Justin Connors | December 8, 2020

No one knows what the future holds, but 2021 is shaping up to be another year of remote work and video conferences. With that in mind, we wanted to provide […]

Learn More
Free Backgrounds for Everyone!

SiegeCast: Unpacking the Packet

By Justin Connors | November 16, 2020

  Registration is Open (link below) https://redsiege.com/packet   Red Siege is back with a brand new SiegeCast! On December 15th at 3pm EST we will be presenting “UNPACKING THE PACKET” […]

Learn More
SiegeCast: Unpacking the Packet

SiegeCast: High Impact Simple Hacks

By Justin Connors | November 9, 2020

This SiegeCast has passed. The video is on our Youtube! https://redsiege.com/ytsubscribe Red Siege is back with a brand new SiegeCast! On November 10th at 3pm EST we will be presenting […]

Learn More
SiegeCast: High Impact Simple Hacks

Netcat and MFD’s – The Gifts That Keep on Giving

By Mike Saunders | October 30, 2020

It’s fairly well known that printers and MFDs can be a gateway to compromise on otherwise secured networks. We regularly encounter networks filled with these devices internal tests and (ab)use […]

Learn More
Netcat and MFD’s – The Gifts That Keep on Giving

Detecting Kerberoasting

By Tim Medin | October 21, 2020

Kerberoasting is an effective method for privilege escalation, pivoting, and even persistence. Let’s take a look at ways to detect (and prevent) this attack. Jump to the portion of this […]

Learn More
Detecting Kerberoasting

SiegeCast: Buffer Overflow 101

By Justin Connors | September 22, 2020

Click the link! https://redsiege.com/buffer101 REGISTRATION IS OPEN! Welcome back to our next SiegeCast! On October 13th at 3pm EDT we will be presenting “BUFFER OVERFLOW 101” There are lots of […]

Learn More
SiegeCast: Buffer Overflow 101