by Corey Overstreet | Feb 27, 2020 | Blog Posts
In the first part of this series, we explored options we typically use to discover domain names, subdomains, available services on those hosts, historical data on the target, and indicators of security and software suites in use. We will turn our focus now to employee...
by Corey Overstreet | Feb 19, 2020 | Blog Posts
In part 1, we discussed how to start with a target’s name and research a company’s history through Wikipedia, gain information about external hosts with DNSDumpster, and continue host discovery with Hurricane Electric’s BGP Toolkit. We will continue...
by Red Siege | Feb 18, 2020 | Blog Posts
I Want My EIP: Buffer Overflow 101 Mike Saunders to Speak at NolaCon Red Siege Information Security Principal Consultant Mike Saunders will present “I Want My EIP: Buffer Overflow 101” at NolaCon, an information security/hacker conference in New Orleans...
by Red Siege | Feb 18, 2020 | Blog Posts
Hacking Dumber Redux: More Dumberer Tim Medin to Speak at Wild West Hacking Fest San Diego Red Siege Principal Consultant Tim Medin will present at 4pm Wednesday, March 11 at the Wild West Hackin’ Fest – Way West in San Diego, California. In Medin’s presentation...
by Corey Overstreet | Feb 4, 2020 | Blog Posts
During an external assessment (be it a penetration test or red team), we here at Red Siege begin by investigating the target as completely as possible before accessing the target’s external assets. During this series of articles, we will demonstrate different...