SE: Build a Caller ID Spoofing Rig

Telephone Caller ID (CID) is often abused to manipulate the recipient's trust. Come explore the technology as STACKTITAN's Alex Sander's demonstrates building a CID spoofing rig.…

Hardware-Hacking: Lifting Firmware

Join us as we explore a technique to lift firmware from hardware. This is the first of many hardware hacking topics that the STACKTITAN team will be sharing and hope that it inspires you to crack open and investigate that perfectly functional router on your desk.…

SMBExec: Red Side Analysis (Part 2)

STACKTITAN's Alex Mason is back with part II in this tradecraft series. This time around he demonstrates modifying SMBExec to bypass various detections.…

SMBExec: Red Side Analysis (Part 1)

Ride along as Alex Mason from STACKTITAN shares tradecraft of analyzing offensive toolchains to identify detection opportunities in part one of this blog series.…

Security on a Budget

Following the completion of all our penetration tests and assessments we take time to review the findings and the deliverable with our customers. During this review, we almost always get asked the following: Of all the vulnerabilities you identified, which ones would you mitigate first? We're a small team and…