Recon Methods Part 4 – Automated OSINT

 (paid In the first three parts of this series, we learned about manual methods for gathering intelligence about a target company, their external hosts, and their employees manually through a myriad of services. Now, we will cover different ways of automating the...

Deceiving the Red Team with GPP

A common tactic used by pen testers, "red teams", and threat actors is searching for Group Policy Preference (GPP) files with usernames and passwords.  These XML files, stored in the domain SYSVOL, are used to create local administrator accounts, map drives, create...

User Enumeration Part 2 – Microsoft Office 365

It's not uncommon on external pen tests and red team engagements to find very little attack surface on the customer's internet-facing networks. Customers have started shifting services to cloud providers, making it harder to find targets. This blog describes how to...

“I Want My EIP: Buffer Overflow 101” at NolaCon

I Want My EIP: Buffer Overflow 101 Mike Saunders to Speak at NolaCon Red Siege Information Security Principal Consultant Mike Saunders will present "I Want My EIP: Buffer Overflow 101" at NolaCon, an information security/hacker conference in New Orleans from May 15 -...

Recon Methods Part 1 – OSINT Host Discovery

During an external assessment (be it a penetration test or red team), we here at Red Siege begin by investigating the target as completely as possible before accessing the target's external assets. During this series of articles, we will demonstrate different methods...

User Enumeration Part 1 – Building Name Lists

A common part of pen tests - both network and web app - is password spraying. In order to do that, you need usernames. But how do you find out what your target's usernames are? This is the first in a series of posts to discuss user enumeration and building custom...

Lessons Learned in Password Cracking

In many tests, we end up having to do some kind of password cracking, Kerberoasted hashes, hashes dumped from the SAM or ntds.dit, or some other kind of hash. When cracking, especially when we have a bunch of SPNs or we've got the ntds.dit, we aren't focused on...

FOLLOW US
Looking for something?
SUBSCRIBE TO BLOG AND WEBCASTS.
No spam. No junk. Just notifications on new content.