Blog

“I Want My EIP: Buffer Overflow 101” at NolaCon

By Red Siege | February 18, 2020

I Want My EIP: Buffer Overflow 101 Mike Saunders to Speak at NolaCon Red Siege Information Security Principal Consultant Mike Saunders will present “I Want My EIP: Buffer Overflow 101” […]

Learn More
“I Want My EIP: Buffer Overflow 101” at NolaCon

Hacking Dumberly Redux: More Dumberer at WWHF San Diego

By Red Siege | February 18, 2020

Hacking Dumber Redux: More Dumberer Tim Medin to Speak at Wild West Hacking Fest San Diego Red Siege Principal Consultant Tim Medin will present at 4pm Wednesday, March 11 at […]

Learn More
Hacking Dumberly Redux: More Dumberer at WWHF San Diego

Recon Methods Part 1 – OSINT Host Discovery

By Red Siege | February 4, 2020

During an external assessment (be it a penetration test or red team), we here at Red Siege begin by investigating the target as completely as possible before accessing the target’s […]

Learn More
Recon Methods Part 1 – OSINT Host Discovery

User Enumeration Part 1 – Building Name Lists

By Mike Saunders | January 30, 2020

A common part of pen tests – both network and web app – is password spraying. In order to do that, you need usernames. But how do you find out […]

Learn More
User Enumeration Part 1 – Building Name Lists

Lessons Learned in Password Cracking

By Mike Saunders | January 16, 2020

In many tests, we end up having to do some kind of password cracking, Kerberoasted hashes, hashes dumped from the SAM or ntds.dit, or some other kind of hash. When […]

Learn More
Lessons Learned in Password Cracking

Open Source Intelligence Through Messaging Apps

By Red Siege | August 19, 2019

During red team engagements, we try to gather information about our targets as quietly as possible. One piece of information that can be difficult to find is employee cell phone […]

Learn More
Open Source Intelligence Through Messaging Apps

Enterprise Security Names Red Siege as a Top 10 Vulnerability Management Company for 2019

By Red Siege | August 6, 2019

To help business providers in selecting promising vulnerability management services, a distinguished panel of prominent marketing specialists and analysts, along with Enterprise Security Magazine editorial board has assessed and shortlisted […]

Learn More
Enterprise Security Names Red Siege as a Top 10 Vulnerability Management Company for 2019

On Purple

By Tim Medin | July 12, 2019

The “Purple Team” term has been flying around for a while now and it is an important development in our growth as an industry. If you haven’t heard the term […]

Learn More
On Purple

Logging Passwords on Linux

By Tim Medin | May 30, 2019

Hal Pomeranz tipped me off to a nasty little trick of using Linux’s own auditing features and PAM to grab clear text passwords from users as they use sudo/su on […]

Learn More
Logging Passwords on Linux

Red Siege Welcomes Corey Overstreet

By Red Siege | May 23, 2019

Overstreet is an experienced penetration tester and red team operator and has been engaged with Fortune 500 organizations across a variety of industries, including financial services, government services, and healthcare. […]

Learn More
Red Siege Welcomes Corey Overstreet