SiegeCast: Be Your Enemy
By Justin Connors | June 23, 2020
Click the link! https://redsiege.com/be-your-enemy REGISTRATION IS OPEN! Welcome back to our next SiegeCast! We will be discussing how the blue team should embrace the skills of the red team! On […]
Learn MoreSiegeCast: Access (Still) Granted
By Justin Connors | June 4, 2020
https://redsiege.com/access_still_granted *UPDATE* This event has passed and the video and transcript can be found at the bottom! Red Siege is back with a brand new SiegeCast! This time we are […]
Learn MoreSiegeCast: Huge Needles, Small Haystack
By Justin Connors | May 11, 2020
https://redsiege.com/haystack *UPDATE This Event has passed and can be viewed below with the transcript!” Red Siege is proud to present its very first SiegeCast! We have been taking part in […]
Learn MoreUser Enumeration Part 3 – Windows
By Mike Saunders | April 16, 2020
This is the third installment in a series of blogs on user enumeration. In Part 1 – Building Name Lists, I talked about ways of building usernames from OSINT and […]
Learn MoreRecon Methods Part 5 – Traffic on the Target
By Red Siege | April 7, 2020
In the previous parts of this series, we looked at different ways to gather intelligence on a target without generating traffic on their hosts through manual processes and automated tools. […]
Learn MoreRecon Methods Part 4 – Automated OSINT
By Red Siege | April 1, 2020
In the first three parts of this series, we learned about manual methods for gathering intelligence about a target company, their external hosts, and their employees manually through a myriad […]
Learn MoreDeceiving the Red Team with GPP
By Mike Saunders | March 24, 2020
A common tactic used by pen testers, “red teams”, and threat actors is searching for Group Policy Preference (GPP) files with usernames and passwords. These XML files, stored in the […]
Learn MoreUser Enumeration Part 2 – Microsoft Office 365
By Mike Saunders | March 10, 2020
It’s not uncommon on external pen tests and red team engagements to find very little attack surface on the customer’s internet-facing networks. Customers have started shifting services to cloud providers, […]
Learn MoreRecon Methods Part 3 – OSINT Employee Discovery
By Red Siege | February 27, 2020
In the first part of this series, we explored options we typically use to discover domain names, subdomains, available services on those hosts, historical data on the target, and indicators […]
Learn MoreRecon Methods Part 2 – OSINT Host Discovery Continued
By Red Siege | February 19, 2020
In part 1, we discussed how to start with a target’s name and research a company’s history through Wikipedia, gain information about external hosts with DNSDumpster, and continue host discovery […]
Learn More