Measuring progress and metrics across red team operations can be done in several different ways. In…
This is a follow-up to the post I previously wrote about the process I went through to write my own…
You have heard it said that attackers will take the least path of resistance and…
Two factor authentication (2FA) has been for some time (and still is) a highly recommended security control for authentication. After all, 2FA does help prevent attackers from just simply using stolen credentials to login and gain…
As a current red teamer (and a former blue teamer), I have seen unauthenticated Jenkins abused in various environments. These instances of unauthenticated Jenkins provide initial access points which often lead to additional access. It is not uncommon to find unauthenticated Jenkins…
Welcome to my first post! I am a career blue teamer turned red teamer a few…