HomeSecurity Research & Devlopment (SRD) | Obscurity Labs

Our prior work

As veteran members of both the Information Technology and Cyber Security fields we have had the ability to contribute, build and develop on tools of the trade. In both offensive and defensive security environments, we have built automation around common task that allow us to provide more value to our customers.

Cyber security research that goes beyond, we have the fortunate ability to conduct Open-source, public and private research. Tailored to our clients needs.

Project Name:
Rapid Attack Infrastructure

DEVLOPER
KEELYN ROBERTS
CATEGORY
INFRASTRUCTURE
DESCRIPTION
Rapid Attack Infrastructure was developed to streamline one of the most tedious phases of a Red Team Operation; infrastructure setup. This usually entails a team- server or controller, domains, redirectors, and a Phishing server. Each of these has their nuances when it comes to setup, but overall, this setup process can take days. This just seemed overly complicated and time-consuming. Several issues come to mind when considering how a painful and slow setup can impact a Red Team, but the most important thing to consider is: What if your domain(s) get burned, and you need to spin up new infrastructure during the OP? Now if you’re an internal Red Team, this may not be an issue, but in the world of Red Team Consulting; time is money. With an RAI deployment, it can all be done in an ~1 hour.
https://obscuritylabs.com/wp-content/uploads/2018/07/Greenshot-2018-07-03-14.22.41.png
https://obscuritylabs.com/wp-content/uploads/2018/07/HOT.png

Project Name:
HoT Framework

DEVLOPER
DANIE WEST
CATEGORY
FRAMEWORK
DESCRIPTION
The HoT Framework to promote best practices for all Federal and State, Local, Tribal, and Territorial (SLTT) governments, non-government organizations (NGOs), and the private sector to use as a foundation for the reconnaissance, interrogation, and hardening of IoT nodes that are characterized as existing within both critical and non-critical infrastructure throughout the physical network layer, logical network layer, and cyber-persona layer of cyberspace terrain. Vulnerabilities, threats, and risks are inherent with the Internet of Things (IoT) devices, which typically reside at the meeting place of critical infrastructure and cyberspace. The HoT Framework serves to assist Federal and SLTT governments, NGOs, and the private sector in thwarting attacks against their IoT devices and preventing their IoT devices from being used as an attack platform.
https://obscuritylabs.com/wp-content/uploads/2018/04/OL-3d-landscape-negative-transparent-25.png
https://obscuritylabs.com/wp-content/uploads/2017/03/logo_white.png
Subscribe

If you wish to receive our latest news in your email box, just subscribe to our newsletter. We won’t spam you, we promise!

Obscurity Labs

At Obscurity Labs, we pride ourselves in our unique ability to integrate comprehensive strategy and cutting edge security into any information operations environment. Within the ever evolving world of information technology, it is imperative that your organization take a proactive, holistic approach to information security operations.

Subscribe

If you wish to receive our latest news in your email box, just subscribe to our newsletter. We won’t spam you, we promise!

Applauz

As the pioneer of the lean startup movement, APPLAUZ has dedicated it’s time to sharing effective business strategies that help new businesses and enterpreneurs put their money to work in the right way.

Copyright by OBSCURITY LABS LLC. All rights reserved.