Adversary Levels

Adversary Levels

1. Level 1 – Common Adversary: This level of adversary is the lowest level tier. Most adversaries at this level are not directly targeting an organization but aiming to attack any easy target or organization. This adversary utilizes basic and free tools with little...
ASX to MP3 Converter Buffer Overflow

ASX to MP3 Converter Buffer Overflow

Upon opening the provided exploit file, fuzzing.asx in Notepad++ it’s clear there is some sort of file formatting taking place. Opening up the same file using Wordpad reveals that this is merely a text file and the payload is simply a large string passed in as an HTTP...
Bug Bounty

Bug Bounty

There are countless resources out there on participating in Bug Bounty programs from a researcher’s perspective. However, there are a surprisingly few number of resources on how to launch and maintain a program in an enterprise ecosystem. Whether you’ve...
Launch an Engagement

Launch an Engagement

So you want to launch an engagement at your organization to simply…find vulnerabilities but you have many questions, and you have questions about your questions, and then there are questions you don’t even know to ask. Where and how do you start? What is your...
Levels of Red Teaming

Levels of Red Teaming

1. Technical Assessment (Generic Adversary Model): Focus is on technology without an adversary model. Examples include running vulnerability scanning tools or even other generic off the shelf tools to identify weaknesses in the environment. This would include...