SiegeCast: Be Your Enemy

Click the link! https://redsiege.com/be-your-enemy REGISTRATION IS OPEN! Welcome back to our next SiegeCast! We will be discussing how the blue team should embrace the skills of the red team! On June 30th at 3pm EDT we will be presenting " Be Your Enemy " Want to be...

read more

SiegeCast: Access (Still) Granted

https://redsiege.com/access_still_granted *UPDATE* This event has passed and the video and transcript can be found at the bottom!  Red Siege is back with a brand new SiegeCast! This time we are going to show you that you dont always need that often coveted access to...

read more

SiegeCast: Huge Needles, Small Haystack

https://redsiege.com/haystack *UPDATE This Event has passed and can be viewed below with the transcript!" Red Siege is proud to present its very first SiegeCast!  We have been taking part in so many fantastic webcasts and have been looking forward to providing one of...

read more

User Enumeration Part 3 – Windows

This is the third installment in a series of blogs on user enumeration.  In Part 1 - Building Name Lists, I talked about ways of building usernames from OSINT and US census data. In this installment, I'm going to discuss putting this info to work in Windows...

read more

Recon Methods Part 4 – Automated OSINT

 (paid In the first three parts of this series, we learned about manual methods for gathering intelligence about a target company, their external hosts, and their employees manually through a myriad of services. Now, we will cover different ways of automating the...

read more

Deceiving the Red Team with GPP

A common tactic used by pen testers, "red teams", and threat actors is searching for Group Policy Preference (GPP) files with usernames and passwords.  These XML files, stored in the domain SYSVOL, are used to create local administrator accounts, map drives, create...

read more

User Enumeration Part 2 – Microsoft Office 365

It's not uncommon on external pen tests and red team engagements to find very little attack surface on the customer's internet-facing networks. Customers have started shifting services to cloud providers, making it harder to find targets. This blog describes how to...

read more

Recon Methods Part 3 – OSINT Employee Discovery

In the first part of this series, we explored options we typically use to discover domain names, subdomains, available services on those hosts, historical data on the target, and indicators of security and software suites in use. We will turn our focus now to employee...

read more

Recon Methods Part 2 – OSINT Host Discovery Continued

In part 1, we discussed how to start with a target's name and research a company's history through Wikipedia, gain information about external hosts with DNSDumpster, and continue host discovery with Hurricane Electric's BGP Toolkit. We will continue our recon by...

read more

FOLLOW US

Search the blog

Never miss a blog or webcast!
No spam. No junk. Just notifications on new content. SUBSCRIBE!