MOST POPULAR VIDEOS
LATEST BLOG POSTS
In the previous parts of this series, we looked at different ways to gather intelligence on a target without generating traffic on their hosts through manual processes and automated tools. Today, we will start to ramp up interactions with the target hosts while...
(paid In the first three parts of this series, we learned about manual methods for gathering intelligence about a target company, their external hosts, and their employees manually through a myriad of services. Now, we will cover different ways of automating the...
A common tactic used by pen testers, "red teams", and threat actors is searching for Group Policy Preference (GPP) files with usernames and passwords. These XML files, stored in the domain SYSVOL, are used to create local administrator accounts, map drives, create...
MOST POPULAR SLIDES
GET THE LATEST
Sign up for the latest resources from Red Siege.