• Newly Released OWASP Top 10 for 2010

    Today, OWASP released the 2010 version of it's Top Ten list. For the complete list, please click here to visit the OWASP website.

    The OWASP Top Ten provides a powerful awareness document for web application security. The OWASP Top Ten represents a broad consensus about what the most critical…

    Read more →
  • Cross-Site Request Forgery Video Demonstration

    Cross-site request forgery, also known as click jacking and sometimes abbreviated CSRF, has been around for a number of years. Cross-site request forgery is a type of malicious exploit of a website whereby unauthorized commands are transmitted from a user that the website trusts. Unlike cross-site scripting (XSS),…

    Read more →
  • Fuzzing with Metasploit

    We are big fans of the Metasploit Framework and its capabilities. The Metasploit Project is an open-source computer security project which provides information about security vulnerabilities and aids in penetration testing and IDS signature development.

    What I love best about Metasploit is its vast library of code. But…

    Read more →
  • Contact Us

    Please contact RedTeam Security regarding your next information security project!

    Contact us
  • Penetration Testing

    We save your business reputation and money by simulating real-world hacker attempts in order to identify security vulnerabilities before they are exploited.

    Contact us
  • Experienced Consultants

    RedTeam consultants are highly-skilled, experienced and certified experts. Our certifications include: CISSP, CEH, CHFI, CCISO, CASS, CEPT and others.

    Contact us