Bringing Red Teaming into the Board Room (Part 1)

Bringing Red Teaming into the Board Room (Part 1)

Over the last few months, I've had the pleasure of speaking at a few events on some of my ideas regarding red teaming techniques at the highest levels of the business. To be clear, this is not all about finding more vulnerabilities (a la pen-testing), but rather challenging our assumptions about what it means to protect an organization. I want to summarize some of the key points from this talk…

A Modern Day Take On The Trojan Horse

A Modern Day Take On The Trojan Horse

I'm going to use this post to elaborate on one particularly fun composite attack scenario that I helped put together a while back. This story involves a client working with some sensitive government agencies, a few different technical attack scenarios, and as the title suggests...a modern day version of the original trojan horse (quite literally). The client who hired our red team was concerned with two distinct threat actors…

The Problem Of Relying On Point-In-Time Vulnerabilities In Red Teaming

The Problem Of Relying On Point-In-Time Vulnerabilities In Red Teaming

Red teaming in the context of information security is an assessment strategy that is all about adversary modeling, which is very useful for identifying various types of vulnerabilities (both directly and indirectly exploitable). Most of the approaches to red teaming in various articles, journals, conferences, etc focus on identifying point-in-time vulnerabilities which are subsequently strung together to form an attack chain. These issues may be identified a number of ways,…