Because I think 2017 should be the year that we really begin to be more proactive and applying the adversarial mindset, act... Don't react. Red team that!

Click on the imnage to get the 1900x1080 wallpaper.

Quote of the day

"Hacking takes time. Developing the tool chain takes time, recon takes time, sometimes systems get hardened and the optimal time to hack them was in the past, and so on and so on. The best time to collect intelligence about an adversary is before you need it."

-- the grugq: Idle Thoughts on Cyber

Calling All Red Teamers: Help Us Build the 2016 Bookshelf

t’s time to update The Red Teamer’s Bookshelf. In the past, we’ve either built the list ourselves or consulted a small group of colleagues. This time we’d like to crowdsource the list in partnership with the Red Team Journal and OODA Loop. Use the contact page to send us the titles of the book or books that you believe red teamers should be reading. (You can reach back into history; these don’t need to be 2016 titles.) When you do send us your title or titles, add a sentence on each telling us why you think it’s important. After a week or so, we’ll aggregate the submissions and post The Red Teamer’s Bookshelf (2016 Edition) at all three sites.

Here are some of the Red Team Journal's previous bookshelves:

RTJ 2009
RTJ 2013

And the OODA Loop Top 10

And finally our bookshelf.

Quote of the day

"The positive power of negative thinking..."

-- Will Gadd

Calling out Red Teamers

So, the Advanced Capabilities Group is almost ready to go. We are in the process of finishing the details on the services, one of which is a specialized, next-level red teaming.

Given that we are a small team and that based on the feedback so far from big corporations and the goverment, this "all in" red teaming has the potential of being a big thing, we want to go back to the idea of having a network of red teamers across the coutry (and later the world) to call upon and augment the team, when a project is in their areas.
The idea is that we would call the red teamers we have on the network in each area for the projects, when needed. These team members will help with the on-site recon, SIGINT, IMINT and all the local aspects until we can get there, and then help with the digital intrussions, social engineering, exploit coding, etc. In short, people we can add to the team when needed. Call this a "network of specialized consulting red teamers".

If you would like to be part of this, please fill the form below. Make it short, just explain who you are and why you want to do this. We'll contact you for more info if we need. Anyone can apply, but bear in mind that we are seeking for eperienced red teamers and security professionals, not "I work on IT and I think I can learn, let me hack!" kind of people.

Now, send it!

Name *

Quote of the day

“Most people are starting to realize that there are only two different types of companies in the world: those that have been breached and know it and those that have been breached and don’t know it. Therefore, prevention is not sufficient and you’re going to have to invest in detection because you’re going to want to know what system has been breached as fast as humanly possible so that you can contain and remediate.”

-- Ted S.

Things happening

The blog has been silent for a while. There are many reasons for this, but two are the most important.
Some of the guys in the team recently got hurt on a project. They are ok and recovering, so no worries. However this has everyone busy.
The other is that a new thing is coming... The Advanced Capabilities Group. Go check this out. It's going to be great.

Quote of the day

"The superior red teamer is a systems thinker. He or seeks to see the whole system and well as its parts, knowing, of course, that the system will look different to different people and different groups."

-- Red Team Journal: The superior red teamer.