SiegeCast: Kerberos and Attacks 101
By Justin Connors | August 25, 2020
Click the link! https://redsiege.com/kerb101 REGISTRATION IS OPEN! Welcome back to our next SiegeCast! On September 15th at 3pm EDT we will be presenting “KERBEROS AND ATTACKS 101” Want to understand […]
Learn MoreCIO Review Names Red Siege as a Top 10 Most Promising Enterprise Security Company for 2020
By Justin Connors | August 25, 2020
In order to assist software companies in countering malicious attacks, CIO has compiled the Top 10 most promising enterprise security solution providers for 2020. Exciting news to discover that Red […]
Learn MoreSiegeCast: Assumed Breach Part II
By Justin Connors | August 18, 2020
Click the link! https://redsiege.com/ab2 Welcome back to our next SiegeCast! On August 18th at 3pm EDT we will be presenting “ASSUMED BREACH PART II” As a continuation of “ASSUMED BREACH […]
Learn MoreSiegeCast: Assumed Breach Part I
By Justin Connors | July 20, 2020
Click the link! https://redsiege.com/ab1 REGISTRATION IS OPEN! Welcome back to our next SiegeCast! On July 28th at 3pm EDT we will be presenting “ASSUMED BREACH PART I” Traditional penetration testing […]
Learn MoreSiegeCast: Be Your Enemy
By Justin Connors | June 23, 2020
Click the link! https://redsiege.com/be-your-enemy REGISTRATION IS OPEN! Welcome back to our next SiegeCast! We will be discussing how the blue team should embrace the skills of the red team! On […]
Learn MoreSiegeCast: Access (Still) Granted
By Justin Connors | June 4, 2020
https://redsiege.com/access_still_granted *UPDATE* This event has passed and the video and transcript can be found at the bottom! Red Siege is back with a brand new SiegeCast! This time we are […]
Learn MoreSiegeCast: Huge Needles, Small Haystack
By Justin Connors | May 11, 2020
https://redsiege.com/haystack *UPDATE This Event has passed and can be viewed below with the transcript!” Red Siege is proud to present its very first SiegeCast! We have been taking part in […]
Learn MoreRemotely Host MSBuild Payloads
By Red Siege | April 27, 2020
tl;dr Separate your C# payload from a MSBuild XML file and host it remotely on a WebDav server. Red teams and attackers frequently repurpose MSBuild, a Microsoft-signed binary, to bypass […]
Learn MoreUser Enumeration Part 3 – Windows
By Mike Saunders | April 16, 2020
This is the third installment in a series of blogs on user enumeration. In Part 1 – Building Name Lists, I talked about ways of building usernames from OSINT and […]
Learn MoreRecon Methods Part 5 – Traffic on the Target
By Red Siege | April 7, 2020
In the previous parts of this series, we looked at different ways to gather intelligence on a target without generating traffic on their hosts through manual processes and automated tools. […]
Learn More