MOST POPULAR VIDEOS

LATEST BLOG POSTS

User Enumeration Part 2 – Microsoft Office 365

It's not uncommon on external pen tests and red team engagements to find very little attack surface on the customer's internet-facing networks. Customers have started shifting services to cloud providers, making it harder to find targets. This blog describes how to...

WEBCASTS

MOST POPULAR SLIDES

 

 

 

 

 

 

 

 

GET THE LATEST

Sign up for the latest resources from Red Siege.