Deceiving the Red Team with GPP
By Mike Saunders | March 24, 2020
A common tactic used by pen testers, “red teams”, and threat actors is searching for Group Policy Preference (GPP) files with usernames and passwords. These XML files, stored in the […]
Learn MoreUser Enumeration Part 2 – Microsoft Office 365
By Mike Saunders | March 10, 2020
It’s not uncommon on external pen tests and red team engagements to find very little attack surface on the customer’s internet-facing networks. Customers have started shifting services to cloud providers, […]
Learn MoreRecon Methods Part 3 – OSINT Employee Discovery
By Red Siege | February 27, 2020
In the first part of this series, we explored options we typically use to discover domain names, subdomains, available services on those hosts, historical data on the target, and indicators […]
Learn MoreRecon Methods Part 2 – OSINT Host Discovery Continued
By Red Siege | February 19, 2020
In part 1, we discussed how to start with a target’s name and research a company’s history through Wikipedia, gain information about external hosts with DNSDumpster, and continue host discovery […]
Learn More“I Want My EIP: Buffer Overflow 101” at NolaCon
By Red Siege | February 18, 2020
I Want My EIP: Buffer Overflow 101 Mike Saunders to Speak at NolaCon Red Siege Information Security Principal Consultant Mike Saunders will present “I Want My EIP: Buffer Overflow 101” […]
Learn MoreHacking Dumberly Redux: More Dumberer at WWHF San Diego
By Red Siege | February 18, 2020
Hacking Dumber Redux: More Dumberer Tim Medin to Speak at Wild West Hacking Fest San Diego Red Siege Principal Consultant Tim Medin will present at 4pm Wednesday, March 11 at […]
Learn MoreRecon Methods Part 1 – OSINT Host Discovery
By Red Siege | February 4, 2020
During an external assessment (be it a penetration test or red team), we here at Red Siege begin by investigating the target as completely as possible before accessing the target’s […]
Learn MoreUser Enumeration Part 1 – Building Name Lists
By Mike Saunders | January 30, 2020
A common part of pen tests – both network and web app – is password spraying. In order to do that, you need usernames. But how do you find out […]
Learn MoreLessons Learned in Password Cracking
By Mike Saunders | January 16, 2020
In many tests, we end up having to do some kind of password cracking, Kerberoasted hashes, hashes dumped from the SAM or ntds.dit, or some other kind of hash. When […]
Learn MoreOpen Source Intelligence Through Messaging Apps
By Red Siege | August 19, 2019
During red team engagements, we try to gather information about our targets as quietly as possible. One piece of information that can be difficult to find is employee cell phone […]
Learn More