<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>red team Archives - Jean-Christoph von Oertzen</title>
	<atom:link href="https://jeanchristophvonoertzen.com/tag/red-team/feed" rel="self" type="application/rss+xml" />
	<link>https://jeanchristophvonoertzen.com/tag/red-team</link>
	<description>Exploring the intersection of cybersecurity, psychology, and resilience.</description>
	<lastBuildDate>Fri, 14 Nov 2025 18:34:47 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://jeanchristophvonoertzen.com/wp-content/uploads/2020/10/favicon-4.png</url>
	<title>red team Archives - Jean-Christoph von Oertzen</title>
	<link>https://jeanchristophvonoertzen.com/tag/red-team</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>What Fantasy Role-Playing Games Can Teach Us About Cybersecurity Roles</title>
		<link>https://jeanchristophvonoertzen.com/what-fantasy-role-playing-games-can-teach-us-about-cybersecurity-roles</link>
					<comments>https://jeanchristophvonoertzen.com/what-fantasy-role-playing-games-can-teach-us-about-cybersecurity-roles#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Fri, 14 Nov 2025 18:34:47 +0000</pubDate>
				<category><![CDATA[Geek]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[blue team]]></category>
		<category><![CDATA[framework]]></category>
		<category><![CDATA[incident response]]></category>
		<category><![CDATA[organization]]></category>
		<category><![CDATA[red team]]></category>
		<category><![CDATA[security awareness]]></category>
		<category><![CDATA[security culture]]></category>
		<category><![CDATA[threat hunting]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=1760</guid>

					<description><![CDATA[<p>— And why your SOC might actually need a Bard 🐉⚔️ Cybersecurity teams are often compared to armies, fire brigades, or special forces. Personally? I think they&#8217;re much closer to a party of heroes in a classic fantasy role-playing game. No matter how many frameworks, SIEMs, or AI tools we summon, defending a digital kingdom [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/what-fantasy-role-playing-games-can-teach-us-about-cybersecurity-roles">What Fantasy Role-Playing Games Can Teach Us About Cybersecurity Roles</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/what-fantasy-role-playing-games-can-teach-us-about-cybersecurity-roles/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar takeaway &#8211; Offensive Windows Event Logs</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-offensive-windows-event-logs</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-offensive-windows-event-logs#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Thu, 08 Sep 2022 18:18:36 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[logging]]></category>
		<category><![CDATA[red team]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=1013</guid>

					<description><![CDATA[<p>My key takeaways there is a POC proving persistence by writing/reading shellcode from Event Log the real issue is execution as it&#8217;s a blind spot for most EDR also Defender Event logs in win are in the registry Bindings of sources to specific log local admins can create a log/source and event log entries via [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-offensive-windows-event-logs">Webinar takeaway &#8211; Offensive Windows Event Logs</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-offensive-windows-event-logs/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar takeaway &#8211; A Master Class on Offensive MSBuild</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-a-master-class-on-offensive-msbuild</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-a-master-class-on-offensive-msbuild#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Wed, 26 Jan 2022 19:27:48 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[living of the land]]></category>
		<category><![CDATA[payload]]></category>
		<category><![CDATA[red team]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=753</guid>

					<description><![CDATA[<p>My key takeaways MSBuild is a binary that is installed by default on Windows no whitelisting required .csproj and .xml files are typical to interact with MSBuild Custom tasks are the juicy stuff Malicious code is placed in the execute function of the custom task and compiled into an dll xml will bypass detection a [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-a-master-class-on-offensive-msbuild">Webinar takeaway &#8211; A Master Class on Offensive MSBuild</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-a-master-class-on-offensive-msbuild/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar Takeaway: The Roundup by Wild West Hackin´ Fest: Red Team</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-the-roundup-by-wild-west-hackin-fest-red-team</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-the-roundup-by-wild-west-hackin-fest-red-team#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Fri, 13 Aug 2021 10:41:06 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[C#]]></category>
		<category><![CDATA[red team]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=546</guid>

					<description><![CDATA[<p>My key takeaways Red is a component of blue Blue can exist without red Red cannot exist without blue red w/o blue = criminal Security Operations Design is often built on existing environment, rarely built from scratch Threat definition: Risk = threat * vulnerability alt: Threat = ThreatActor + Intent + Tool/Technique Good intentions by [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-the-roundup-by-wild-west-hackin-fest-red-team">Webinar Takeaway: The Roundup by Wild West Hackin´ Fest: Red Team</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-the-roundup-by-wild-west-hackin-fest-red-team/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar takeaways: Attack Tactics 8 &#8211; Poison the Well</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaways-attack-tactics-8-poison-the-well</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaways-attack-tactics-8-poison-the-well#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Thu, 01 Jul 2021 18:27:25 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[azure]]></category>
		<category><![CDATA[red team]]></category>
		<category><![CDATA[sharepoint]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=515</guid>

					<description><![CDATA[<p>My key takeaways Bad documents eg with macros enabled in SharePoint? No need to bypass phishing controls anymore! Documents are already trusted by users Difficult to trace M$ SmartLockout is effective to reduce direct attacks FireProx (AWS) or Proxycannon-ng (OpenVPN) can circumvent it unsolicited push notifications to bypass MFA can&#8217;t be reported as phish might [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaways-attack-tactics-8-poison-the-well">Webinar takeaways: Attack Tactics 8 &#8211; Poison the Well</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaways-attack-tactics-8-poison-the-well/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Workshop takeaways: OSINT for Cyber Defenders</title>
		<link>https://jeanchristophvonoertzen.com/workshop-takeaways-osint-for-cyber-defenders</link>
					<comments>https://jeanchristophvonoertzen.com/workshop-takeaways-osint-for-cyber-defenders#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Sun, 20 Jun 2021 11:09:27 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[BSides]]></category>
		<category><![CDATA[OSINT]]></category>
		<category><![CDATA[red team]]></category>
		<category><![CDATA[workshop]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=502</guid>

					<description><![CDATA[<p>My key takeaways Always do OSINT with the assumption in mind, that the software you are using is compromised Sock puppet accounts do not use real images like from Google Image Search as this might be considered identity theft in some countries make the email account information match you sock puppet use lastpass to store [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/workshop-takeaways-osint-for-cyber-defenders">Workshop takeaways: OSINT for Cyber Defenders</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/workshop-takeaways-osint-for-cyber-defenders/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar Takeaway: Getting Started in Pentesting The Cloud &#8211; Azure</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-getting-started-in-pentesting-the-cloud-azure</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-getting-started-in-pentesting-the-cloud-azure#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Thu, 27 May 2021 18:09:24 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[azure]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[red team]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=472</guid>

					<description><![CDATA[<p>My key takeaways Hybrid environments make cloud to on-prem pivoting possible 3 attack surfaces external: public buckets internal resource access: internal to cloud internal api access: identify vulns via API calls &#38; configuration analysis Azure and O365 are not the same Azure Resouce Manager : Subscriptions and Resources Microsoft Office 365: Productivity O365 accounts get [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-getting-started-in-pentesting-the-cloud-azure">Webinar Takeaway: Getting Started in Pentesting The Cloud &#8211; Azure</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-getting-started-in-pentesting-the-cloud-azure/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar Takeaway: Shellcode Execution with GoLang</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-shellcode-execution-with-golang</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-shellcode-execution-with-golang#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Thu, 20 May 2021 18:11:39 +0000</pubDate>
				<category><![CDATA[Code]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Golang]]></category>
		<category><![CDATA[red team]]></category>
		<category><![CDATA[reverse shell]]></category>
		<category><![CDATA[shellcode]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=461</guid>

					<description><![CDATA[<p>My key takeaways Go basics: local functions start with small letter, exported functions start with a capital letter walrus operator = declare and initialize in one statement like k := 3 the only loop is a for loop Go is truly a compiled language, it produces a machine native executable Shellcode: machine code native to [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-shellcode-execution-with-golang">Webinar Takeaway: Shellcode Execution with GoLang</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-shellcode-execution-with-golang/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar takeaway: Move Aside Script Kiddies: Malware Execution in the Age of Advanced Defenses</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-move-aside-script-kiddies-malware-execution-in-the-age-of-advanced-defenses</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-move-aside-script-kiddies-malware-execution-in-the-age-of-advanced-defenses#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Thu, 03 Dec 2020 19:02:11 +0000</pubDate>
				<category><![CDATA[Code]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[red team]]></category>
		<category><![CDATA[reverse shell]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=280</guid>

					<description><![CDATA[<p>My key takeaways it&#8217;s getting harder to execute malware in a lot of environments, also due to endpoint maturity 3 parts of an assumed compromise: priv esc, lateral movement, senstive data access Win10 is safer then ever, also Windows Defender has improved defense vendors have signatures for almost all metaspoilt machine code nowadays you can&#8217;t [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-move-aside-script-kiddies-malware-execution-in-the-age-of-advanced-defenses">Webinar takeaway: Move Aside Script Kiddies: Malware Execution in the Age of Advanced Defenses</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-move-aside-script-kiddies-malware-execution-in-the-age-of-advanced-defenses/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
