• Persistent Backtrack 4 on USB Drive

    We found a great video tutorial from the fine folks at Hak5 that we believe to be quite useful. The video provides instructions for installing and persistently running Backtrack 4 on a USB drive. The following is from the Hak5 website...

    BackTrack is widely considered the complete hacker boot disc.…

    Read more →
  • Reverse Engineering: Python Coding at MIT

    As many reverse engineers, malware analysts and security researchers know, the Python language is among one of the best languages to develop exploits under. While some researchers prefer C and in some cases Perl, Python is my personal favorite.

    As I got into reverse engineering and security research, one of…

    Read more →
  • Tiger Team Hacking

    Tiger Team is a term often used to describe a specialized group tasked with testing the effectiveness of an organization's ability to protect its assets, by attempting to circumvent, defeat, or otherwise thwart that organization's internal and external security.

    The term Tiger Team or Tiger Team Hacking became popular in…

    Read more →
  • Contact Us

    Please contact RedTeam Security regarding your next information security project!

    Contact us
  • Ethical Hacking

    We save your business reputation and money by simulating real-world hacker attempts in order to identify security vulnerabilities before they are exploited.

    Contact us
  • Experienced Consultants

    RedTeam consultants are highly-skilled, experienced and certified experts. Our certifications include: CISSP, CEH, CHFI, CCISO, CASS, CEPT and others.

    Contact us