• Vulnerability Management from the Cloud

    Vulnerability Management from the Cloud

    We've got a few great ideas brewing here at RedTeam. In just a few months, we'll be launching our cloud-based vulnerability management platform, tentatively called GuardEx.

    About GuardEx
    GuardEx will provide customers with a highly available platform for which to identify vulnerabilities in their internet-facing infrastructure and manage those vulnerabilities…

    Read more →
  • Cisco Password Decrypter

    Cisco Password Decrypter

    We have published a new RedTeam Security Lab tool for use by students and experienced penetration testers. The tool is a proof-of-concept application that decrypts Cisco Type 7 passwords. We have provided an online demo as well as proof-of-concept code written in PHP in CodeIgniter. As always, our tools and…

    Read more →
  • Soft Tempest and Electronic Spying

    Soft Tempest and Electronic Spying

    I came across an interesting, but not so recent research paper regarding a different twist on TEMPEST. For those unfamiliar with the term TEMPEST, it is another name for investigations and studies of compromising electromagnetic emanations. These electromagnetic emanations originate from electronic devices, such as computer monitors, that…

    Read more →
  • Contact Us

    Please contact RedTeam Security regarding your next information security project!

    Contact us
  • Ethical Hacking

    We save your business reputation and money by simulating real-world hacker attempts in order to identify security vulnerabilities before they are exploited.

    Contact us
  • Experienced Consultants

    RedTeam consultants are highly-skilled, experienced and certified experts. Our certifications include: CISSP, CEH, CHFI, CCISO, CASS, CEPT and others.

    Contact us