Eric Gonzales Eric Gonzales

Red Teaming the Adversary: Detecting Weaponized Infrastructure Before the First Phish

Can your current reconnaissance distinguish between a harmless parked domain and weaponized infrastructure that already possesses active mail servers and cloned login portals ready to strike? This analysis explores the detection of pre-staged adversary infrastructure, demonstrating how to identify malicious intent and capability to neutralize Business Email Compromise (BEC) campaigns before the first email is ever sent.

Read More
Threat NG Staff Threat NG Staff

From Black Box to White Box: Weaponizing Developer Breadcrumbs

Could the keys to your client's internal infrastructure be hiding in the "TODO" notes and SaaS links left behind in their public source code? This analysis explores the "Developer Breadcrumbs" technique, demonstrating how to automate the discovery of hidden staging environments and internal project intel to instantly escalate your social engineering attacks.

Read More
Eric Gonzales Eric Gonzales

The Ghost City: Why Orphaned Subdomains Are Your Best Entry Point

Are you relying solely on client-provided Swagger documentation while missing the undocumented "Shadow APIs" hiding on orphaned subdomains that bypass standard WAF defenses? This analysis unveils the "Ghost City" of legacy infrastructure, demonstrating how to automate the discovery of these forgotten endpoints to secure high-impact, unauthenticated access.

Read More
Threat NG Staff Threat NG Staff

The Shadow Periphery: Finding the Cloud Buckets Your Client Forgot

Are you limiting your reconnaissance to the client's provided IP range while critical data leaks from "Shadow" storage buckets in the public cloud? This analysis explores the mechanics of "Shadow Cloud Buckets," demonstrating how to automate the discovery of off-scope assets to secure stealthy initial access and pivot into the internal network.

Read More
Threat NG Staff Threat NG Staff

The Boardroom Backdoor: Why Your Red Team Needs Financial OSINT

Do you know exactly which "Material Weaknesses" your client has legally confessed to the SEC, and how to map those admissions directly to exposed technical infrastructure? This analysis explores the "Boardroom Backdoor" of Financial OSINT, demonstrating how to automate the correlation of regulatory filings with external vulnerabilities to prove negligence and secure executive impact.

Read More
Threat NG Staff Threat NG Staff

The Ghost in the Machine: Weaponizing Dangling DNS for Immediate Impact

Are your reconnaissance tools wasting hours flagging false positives on broken links instead of identifying exploitable takeover targets? This analysis breaks down the mechanics of "Ghost" Subdomain Takeovers and demonstrates how to automate the validation of dangling DNS records to secure high-severity findings immediately.

Read More
Threat NG Staff Threat NG Staff

The Glass Hotel: Why Mobile Apps and Personal Repos Are Your Client’s Biggest Blind Spot

While you exhaust billable hours bypassing the WAF, have you considered that the "Master Key" to the infrastructure might already be exposed in a developer's personal GitHub repo or a compiled mobile app? This analysis explores the "Glass Hotel" of Non-Human Identity (NHI) leaks and demonstrates how to automate the discovery of these off-scope vulnerabilities to secure "Initial Access" immediately.

Read More