User Enumeration Part 3 – Windows

User Enumeration Part 3 – Windows

By Mike Saunders | April 16, 2020

This is the third installment in a series of blogs on user enumeration. In Part 1 – Building Name Lists, I talked about ways of building usernames from OSINT and […]

Learn More
User Enumeration Part 3 – Windows

Recon Methods Part 5 – Traffic on the Target

By Red Siege | April 7, 2020

In the previous parts of this series, we looked at different ways to gather intelligence on a target without generating traffic on their hosts through manual processes and automated tools. […]

Learn More
Recon Methods Part 5 – Traffic on the Target

Recon Methods Part 3 – OSINT Employee Discovery

By Red Siege | February 27, 2020

In the first part of this series, we explored options we typically use to discover domain names, subdomains, available services on those hosts, historical data on the target, and indicators […]

Learn More
Recon Methods Part 3 – OSINT Employee Discovery

Recon Methods Part 2 – OSINT Host Discovery Continued

By Red Siege | February 19, 2020

In part 1, we discussed how to start with a target’s name and research a company’s history through Wikipedia, gain information about external hosts with DNSDumpster, and continue host discovery […]

Learn More
Recon Methods Part 2 – OSINT Host Discovery Continued

Recon Methods Part 1 – OSINT Host Discovery

By Red Siege | February 4, 2020

During an external assessment (be it a penetration test or red team), we here at Red Siege begin by investigating the target as completely as possible before accessing the target’s […]

Learn More
Recon Methods Part 1 – OSINT Host Discovery