HomeSecurity Research & Development (SRD) | Obscurity Labs

Our prior work

As veteran members of both the Information Technology and Cyber Security fields we have had the ability to contribute, build and develop on tools of the trade. In both offensive and defensive security environments, we have built automation around common task that allow us to provide more value to our customers.

Cybersecurity research that goes beyond, we have the fortunate ability to conduct Open-source, public and private research. Tailored to our clients needs.

Project Name:
Rapid Attack Infrastructure

DEVLOPER
KEELYN ROBERTS
CATEGORY
INFRASTRUCTURE
DESCRIPTION
Rapid Attack Infrastructure was developed to streamline one of the most tedious phases of a Red Team Operation; infrastructure setup. This usually entails a team- server or controller, domains, redirectors, and a Phishing server. Each of these has their nuances when it comes to setup, but overall, this setup process can take days. This just seemed overly complicated and time-consuming. Several issues come to mind when considering how a painful and slow setup can impact a Red Team, but the most important thing to consider is: What if your domain(s) get burned, and you need to spin up new infrastructure during the OP? Now if you’re an internal Red Team, this may not be an issue, but in the world of Red Team Consulting; time is money. With an RAI deployment, it can all be done in an ~1 hour.
https://obscuritylabs.com/wp-content/uploads/2018/07/Greenshot-2018-07-03-14.22.41.png
https://obscuritylabs.com/wp-content/uploads/2018/07/HOT.png

Project Name:
HoT Framework

DEVLOPER
DANIE WEST
CATEGORY
FRAMEWORK
DESCRIPTION
The HoT Framework to promote best practices for all Federal and State, Local, Tribal, and Territorial (SLTT) governments, non-government organizations (NGOs), and the private sector to use as a foundation for the reconnaissance, interrogation, and hardening of IoT nodes that are characterized as existing within both critical and non-critical infrastructure throughout the physical network layer, logical network layer, and cyber-persona layer of cyberspace terrain. Vulnerabilities, threats, and risks are inherent with the Internet of Things (IoT) devices, which typically reside at the meeting place of critical infrastructure and cyberspace. The HoT Framework serves to assist Federal and SLTT governments, NGOs, and the private sector in thwarting attacks against their IoT devices and preventing their IoT devices from being used as an attack platform.

Our prior work

As veteran members of both the Information Technology and Cyber Security fields we have had the ability to contribute, build and develop on tools of the trade. In both offensive and defensive security environments, we have built automation around common task that allow us to provide more value to our customers.

Cybersecurity research that goes beyond, we have the fortunate ability to conduct Open-source, public and private research. Tailored to our clients needs.

Project Name:
Rapid Attack Infrastructure

DEVLOPER
KEELYN ROBERTS
CATEGORY
INFRASTRUCTURE
DESCRIPTION
Rapid Attack Infrastructure was developed to streamline one of the most tedious phases of a Red Team Operation; infrastructure setup. This usually entails a team- server or controller, domains, redirectors, and a Phishing server. Each of these has their nuances when it comes to setup, but overall, this setup process can take days. This just seemed overly complicated and time-consuming. Several issues come to mind when considering how a painful and slow setup can impact a Red Team, but the most important thing to consider is: What if your domain(s) get burned, and you need to spin up new infrastructure during the OP? Now if you’re an internal Red Team, this may not be an issue, but in the world of Red Team Consulting; time is money. With an RAI deployment, it can all be done in an ~1 hour.
https://obscuritylabs.com/wp-content/uploads/2018/07/Greenshot-2018-07-03-14.22.41.png
https://obscuritylabs.com/wp-content/uploads/2018/07/HOT.png

Project Name:
HoT Framework

DEVLOPER
DANIE WEST
CATEGORY
FRAMEWORK
DESCRIPTION
The HoT Framework to promote best practices for all Federal and State, Local, Tribal, and Territorial (SLTT) governments, non-government organizations (NGOs), and the private sector to use as a foundation for the reconnaissance, interrogation, and hardening of IoT nodes that are characterized as existing within both critical and non-critical infrastructure throughout the physical network layer, logical network layer, and cyber-persona layer of cyberspace terrain. Vulnerabilities, threats, and risks are inherent with the Internet of Things (IoT) devices, which typically reside at the meeting place of critical infrastructure and cyberspace. The HoT Framework serves to assist Federal and SLTT governments, NGOs, and the private sector in thwarting attacks against their IoT devices and preventing their IoT devices from being used as an attack platform.
Call Now Button