Blog

SiegeCast: Kerberos and Attacks 101

By Justin Connors | August 25, 2020

Click the link! https://redsiege.com/kerb101 REGISTRATION IS OPEN! Welcome back to our next SiegeCast! On September 15th at 3pm EDT we will be presenting “KERBEROS AND ATTACKS 101” Want to understand […]

Learn More
SiegeCast: Kerberos and Attacks 101

CIO Review Names Red Siege as a Top 10 Most Promising Enterprise Security Company for 2020

By Justin Connors | August 25, 2020

In order to assist software companies in countering malicious attacks, CIO has compiled the Top 10 most promising enterprise security solution providers for 2020. Exciting news to discover that Red […]

Learn More
CIO Review Names Red Siege as a Top 10 Most Promising Enterprise Security Company for 2020

SiegeCast: Assumed Breach Part II

By Justin Connors | August 18, 2020

Click the link! https://redsiege.com/ab2 Welcome back to our next SiegeCast! On August 18th at 3pm EDT we will be presenting “ASSUMED BREACH PART II” As a continuation of “ASSUMED BREACH […]

Learn More
SiegeCast: Assumed Breach Part II

SiegeCast: Assumed Breach Part I

By Justin Connors | July 20, 2020

Click the link! https://redsiege.com/ab1 REGISTRATION IS OPEN! Welcome back to our next SiegeCast!  On July 28th at 3pm EDT we will be presenting “ASSUMED BREACH PART I” Traditional penetration testing […]

Learn More
SiegeCast: Assumed Breach Part I

SiegeCast: Be Your Enemy

By Justin Connors | June 23, 2020

Click the link! https://redsiege.com/be-your-enemy REGISTRATION IS OPEN! Welcome back to our next SiegeCast! We will be discussing how the blue team should embrace the skills of the red team! On […]

Learn More
SiegeCast: Be Your Enemy

SiegeCast: Access (Still) Granted

By Justin Connors | June 4, 2020

https://redsiege.com/access_still_granted *UPDATE* This event has passed and the video and transcript can be found at the bottom!  Red Siege is back with a brand new SiegeCast! This time we are […]

Learn More
SiegeCast: Access (Still) Granted

SiegeCast: Huge Needles, Small Haystack

By Justin Connors | May 11, 2020

https://redsiege.com/haystack *UPDATE This Event has passed and can be viewed below with the transcript!” Red Siege is proud to present its very first SiegeCast! We have been taking part in […]

Learn More
SiegeCast: Huge Needles, Small Haystack

Remotely Host MSBuild Payloads

By Red Siege | April 27, 2020

tl;dr Separate your C# payload from a MSBuild XML file and host it remotely on a WebDav server. Red teams and attackers frequently repurpose MSBuild, a Microsoft-signed binary, to bypass […]

Learn More
Remotely Host MSBuild Payloads

User Enumeration Part 3 – Windows

By Mike Saunders | April 16, 2020

This is the third installment in a series of blogs on user enumeration. In Part 1 – Building Name Lists, I talked about ways of building usernames from OSINT and […]

Learn More
User Enumeration Part 3 – Windows

Recon Methods Part 5 – Traffic on the Target

By Red Siege | April 7, 2020

In the previous parts of this series, we looked at different ways to gather intelligence on a target without generating traffic on their hosts through manual processes and automated tools. […]

Learn More
Recon Methods Part 5 – Traffic on the Target