Security Risk Advisors

Category: Red Teams

Getting the GAL

August 24, 2016 | Posted in Red Teams by Barrett Adams

Background

One of the staples of any external penetration test is a single-password brute force attack against single-factor remote access portals. To start, we gather a list of likely usernames or emails (whatever the targeted portal requires) and us… Continue Reading

Baiting the C-Suite with Panama Paper Hysteria

May 24, 2016 | Posted in Red Teams by Dan Astor

What is Whaling?

Spear phishing continues to be a trend amongst attackers as one of the easier ways into a company’s environment as it only takes a single user to take the bait. This can be especially troublesome when attackers begin to target high va… Continue Reading

Using CA Process Automation to Get Command Execution as SYSTEM

May 4, 2016 | Posted in Red Teams by Steven Vanlandingham

On internal penetration tests, it is common to get a foothold using man-in-the-middle techniques such as Link-Local Multicast Name Resolution (LLMNR) or WPAD. On a recent engagement, we encountered an added challenge because NetBios over TCP was disa… Continue Reading

Plastic Beach: Gaining Access to CDEs

January 11, 2016 | Posted in Red Teams by Dan Astor

Penetration testing engagements should begin with a mutually-agreed "trophy list" which represent the assets to be targeted for proof-of-concept compromise. During our penetration tests where PCI systems are in-scope, accessing the CDE and the covete… Continue Reading

2014 Pittsburgh Security B-Sides

June 23, 2014 | Posted in Red Teams by Jake Liefer

We recently presented at the 2014 Pittsburgh Security B-Sides on the topic of gaining physical access to facilities. From social engineering to cloning RFID badges, we discuss ways attackers can gain access as well as ways to protect your critical ph… Continue Reading