User Enumeration Part 2 – Microsoft Office 365
It's not uncommon on external pen tests and red team engagements to find very little attack surface on the customer's internet-facing networks. Customers have started shifting services to cloud providers, making it harder to find targets. This blog describes how to...
Recon Methods Part 3 – OSINT Employee Discovery
In the first part of this series, we explored options we typically use to discover domain names, subdomains, available services on those hosts, historical data on the target, and indicators of security and software suites in use. We will turn our focus now to employee...
Recon Methods Part 2 – OSINT Host Discovery Continued
In part 1, we discussed how to start with a target's name and research a company's history through Wikipedia, gain information about external hosts with DNSDumpster, and continue host discovery with Hurricane Electric's BGP Toolkit. We will continue our recon by...
“I Want My EIP: Buffer Overflow 101” at NolaCon
I Want My EIP: Buffer Overflow 101 Mike Saunders to Speak at NolaCon Red Siege Information Security Principal Consultant Mike Saunders will present "I Want My EIP: Buffer Overflow 101" at NolaCon, an information security/hacker conference in New Orleans from May 15 -...
Hacking Dumberly Redux: More Dumberer at WWHF San Diego
Hacking Dumber Redux: More Dumberer Tim Medin to Speak at Wild West Hacking Fest San Diego Red Siege Principal Consultant Tim Medin will present at 4pm Wednesday, March 11 at the Wild West Hackin’ Fest – Way West in San Diego, California. In Medin’s presentation...
Recon Methods Part 1 – OSINT Host Discovery
During an external assessment (be it a penetration test or red team), we here at Red Siege begin by investigating the target as completely as possible before accessing the target's external assets. During this series of articles, we will demonstrate different methods...
User Enumeration Part 1 – Building Name Lists
A common part of pen tests - both network and web app - is password spraying. In order to do that, you need usernames. But how do you find out what your target's usernames are? This is the first in a series of posts to discuss user enumeration and building custom...
Lessons Learned in Password Cracking
In many tests, we end up having to do some kind of password cracking, Kerberoasted hashes, hashes dumped from the SAM or ntds.dit, or some other kind of hash. When cracking, especially when we have a bunch of SPNs or we've got the ntds.dit, we aren't focused on...
Open Source Intelligence Through Messaging Apps
During red team engagements, we try to gather information about our targets as quietly as possible. One piece of information that can be difficult to find is employee cell phone numbers. While researching a different subject, I stumbled across a way to correlate cell...

Enterprise Security Names Red Siege as a Top 10 Vulnerability Management Company for 2019
To help business providers in selecting promising vulnerability management services, a distinguished panel of prominent marketing specialists and analysts, along with Enterprise Security Magazine editorial board has assessed and shortlisted the companies offering...
No spam. No junk. Just notifications on new content.