Collaboration between offensive (Red Team) and defensive (Blue Team) operations is essential to fortify an organization’s defenses. During a recent SiegeCast session, Tim Medin (CEO of Red Siege), Justin Polk […]
by Mike Saunders, Principal Consultant This blog is the twelfth in a series of blogs on obfuscation techniques for hiding shellcode. You can find the rest of the […]
by Douglas Berdeaux, Senior Security Consultant As penetration testers, ensuring the security and integrity of our tools and data is paramount. One key aspect of this is creating a […]
by Mike Saunders, Principal Consultant This blog is the eleventh in a series of blogs on obfuscation techniques for hiding shellcode. You can find the rest of the […]
by Mike Saunders, Principal Security Consultant This blog is the tenth in a series of blogs on obfuscation techniques for hiding shellcode. You can find the rest of […]
by Mike Saunders, Principal Security Consultant This blog is the ninth in a series of blogs on obfuscation techniques for hiding shellcode. You can find the rest of […]
by Douglas Berdeaux, Senior Security Consultant As cybersecurity professionals, we adhere to standard practices that ensure that we are absolutely as thorough as possible in our hunt for security vulnerabilities […]
by Mike Saunders, Principal Security Consultant This blog is the eighth in a series of blogs on obfuscation techniques for hiding shellcode. You can find the rest of […]
by Mike Saunders, Principal Security Consultant This blog is the seventh in a series of blogs on obfuscation techniques for hiding shellcode. You can find the rest of the series […]
By Stuart Rorer, Security Consultant As a kid, I remember watching shopping contest shows where people, wildly, darted through a store trying to obtain specific objects, or gather as much […]
by Mike Saunders, Principal Security Consultant This blog is the sixth in a series of blogs on obfuscation techniques for hiding shellcode. You can find the rest of […]
by Mike Saunders, Principal Consultant This blog is the fifth in a series of blogs on obfuscation techniques for hiding shellcode. You can find the rest of the series here. […]
by Mike Saunders, Principal Security Consultant This blog is the fourth in a series of blogs on obfuscation techniques for hiding shellcode. You can find the rest of the series […]
As the CEO of Red Siege Information Security, I’ve had the privilege of building an outstanding team of ethical hackers to conduct numerous penetration tests for organizations across many industries. […]
By Mike Saunders, Principal Security Consultant This blog is the third in a series of blogs on obfuscation techniques for hiding shellcode. You can find the rest of the series […]
by Douglas Berdeaux, Senior Security Consultant CTF redsiege.com/phoneswitch Getting Started Phone phreaking is the practice of exploring and hacking telephones, telephone switches, telephone test equipment, and physically exploring the telephone […]
by Mike Saunders, Principal Security Consultant This blog is the second in a series of blogs on obfuscation techniques for hiding shellcode. You can find the rest of the series […]
by Mike Saunders, Principal Security Consultant This blog is the first in a series of articles on methods for obfuscating shellcode. I’ll be focusing on how to obfuscate shellcode to […]
by Tim Medin, CEO Penetration testing is a critical component of a well-rounded cybersecurity strategy. Penetration testing identifies vulnerabilities before malicious actors can exploit them. However, the true value of […]
by Senior Security Consultant Douglas Berdeaux On a recent web application penetration test engagement, I came across a JSON Web Token (JWT) that contained an x5u header parameter. I almost […]
Red Siege
Checked
7 hours 48 minutes ago
Penetration Testing, Red Teaming, and Vulnerability Assessments