SiegeCast: Properly Preparing for a Pentest

SiegeCast: Properly Preparing for a Pentest

By Justin Connors | October 25, 2021

October 26th at 3pm Eastern. Defenders, we know you want to make sure you are getting the maximum value from your penetration test. On this SiegeCast, Senior Security Consultant Alex […]

Learn More
SiegeCast: Properly Preparing for a Pentest

SiegeCast: Cobalt Strike Basics

By Red Siege | September 13, 2021

Sept 14th at 3pm Eastern. Tim Medin breaks down everything you need to know about Cobalt Strike with its very own Tech Director, Joe Vest How to watch: Youtube: https://redsiege.com/ytsubscribe […]

Learn More
SiegeCast: Cobalt Strike Basics

Bypassing Signature-Based AV

By Red Siege | August 25, 2021

If you want to execute arbitrary code on an endpoint during a penetration test, red team, or assumed breach, chances are you’ll have to evade some kind of antivirus solution. […]

Learn More
Bypassing Signature-Based AV

Now Streaming SiegeCasts!

By Red Siege | August 17, 2021

We are excited to bring you this brand new SiegeCast in a fresh new format!  On August 24th at 3pm Eastern the new SiegeCast from  Security Consultant Jason Downey will […]

Learn More
Now Streaming SiegeCasts!

Hacking OAuth2.0

By Red Siege | March 22, 2021

The intent of this blog is to help penetration testers and security researchers get a deeper understanding of the OAuth protocol. We are going to learn how to bypass authentication […]

Learn More
Hacking OAuth2.0

Networking Fundamentals Part I

By Red Siege | February 10, 2021

This blog is the first of three in a series to go over some basic networking fundamentals that every security professional should know. These blogs are geared towards the absolute […]

Learn More
Networking Fundamentals Part I

SiegeCast : Web Api Weaknesses

By Justin Connors | January 11, 2021

Learn More
SiegeCast : Web Api Weaknesses

Threading the Needles: Why Defense in Depth Still Matters

By Mike Saunders | January 6, 2021

I recently performed an assumed breach test against what I would consider an Apex Defender organization. The security team is smart, well-funded, extremely capable, and resourceful. The team has both […]

Learn More
Threading the Needles: Why Defense in Depth Still Matters