
CIO Review Names Red Siege as a Top 10 Most Promising Enterprise Security Company for 2020
In order to assist software companies in countering malicious attacks, CIO has compiled the Top 10 most promising enterprise security solution providers for 2020. Exciting news to discover that Red Siege has been selected as one of the Top 10 Enterprise Security...
SiegeCast: Assumed Breach Part II
Click the link! https://redsiege.com/ab2 Welcome back to our next SiegeCast! On August 18th at 3pm EDT we will be presenting "ASSUMED BREACH PART II" As a continuation of "ASSUMED BREACH PART I" with Tim Medin - We will be taking an even deeper and more critical look...
SiegeCast: Assumed Breach Part I
Click the link! https://redsiege.com/ab1 REGISTRATION IS OPEN! Welcome back to our next SiegeCast! On July 28th at 3pm EDT we will be presenting "ASSUMED BREACH PART I" Traditional penetration testing often concede internal access to the tester, but then the tester...
SiegeCast: Be Your Enemy
Click the link! https://redsiege.com/be-your-enemy REGISTRATION IS OPEN! Welcome back to our next SiegeCast! We will be discussing how the blue team should embrace the skills of the red team! On June 30th at 3pm EDT we will be presenting " Be Your Enemy " Want to be...
SiegeCast: Access (Still) Granted
https://redsiege.com/access_still_granted *UPDATE* This event has passed and the video and transcript can be found at the bottom! Red Siege is back with a brand new SiegeCast! This time we are going to show you that you dont always need that often coveted access to...
SiegeCast: Huge Needles, Small Haystack
https://redsiege.com/haystack *UPDATE This Event has passed and can be viewed below with the transcript!" Red Siege is proud to present its very first SiegeCast! We have been taking part in so many fantastic webcasts and have been looking forward to providing one of...
User Enumeration Part 3 – Windows
This is the third installment in a series of blogs on user enumeration. In Part 1 - Building Name Lists, I talked about ways of building usernames from OSINT and US census data. In this installment, I'm going to discuss putting this info to work in Windows...
Recon Methods Part 5 – Traffic on the Target
In the previous parts of this series, we looked at different ways to gather intelligence on a target without generating traffic on their hosts through manual processes and automated tools. Today, we will start to ramp up interactions with the target hosts while...
Recon Methods Part 4 – Automated OSINT
(paid In the first three parts of this series, we learned about manual methods for gathering intelligence about a target company, their external hosts, and their employees manually through a myriad of services. Now, we will cover different ways of automating the...
Deceiving the Red Team with GPP
A common tactic used by pen testers, "red teams", and threat actors is searching for Group Policy Preference (GPP) files with usernames and passwords. These XML files, stored in the domain SYSVOL, are used to create local administrator accounts, map drives, create...
No spam. No junk. Just notifications on new content.