{"id":750,"date":"2025-05-17T22:11:44","date_gmt":"2025-05-17T22:11:44","guid":{"rendered":"https:\/\/sirensecurity.io\/blog\/?p=750"},"modified":"2025-05-18T18:42:13","modified_gmt":"2025-05-18T18:42:13","slug":"assume-breach","status":"publish","type":"post","link":"https:\/\/sirensecurity.io\/blog\/assume-breach\/","title":{"rendered":"Assume Breach"},"content":{"rendered":"\n<div class=\"wp-block-cover aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1456\" height=\"816\" class=\"wp-block-cover__image-background wp-image-729\" alt=\"\" src=\"https:\/\/sirensecurity.io\/blog\/wp-content\/uploads\/2025\/05\/assume-breach-1.png\" data-object-fit=\"cover\"\/><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<p class=\"has-text-align-center has-large-font-size\">Assume Breach<br><br><em>Perimeter is a Myth.<br><\/em><br>-S1REN<\/p>\n<\/div><\/div>\n\n\n\n<figure class=\"wp-block-embed aligncenter is-type-wp-embed is-provider-siren-security wp-block-embed-siren-security\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"CM6GN4UseL\"><a href=\"https:\/\/sirensecurity.io\/blog\/assume-breach-reference\/\">Assume Breach Reference<\/a><\/blockquote><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; visibility: hidden;\" title=\"&#8220;Assume Breach Reference&#8221; &#8212; Siren Security\" src=\"https:\/\/sirensecurity.io\/blog\/assume-breach-reference\/embed\/#?secret=UdkEJ0YvOH#?secret=CM6GN4UseL\" data-secret=\"CM6GN4UseL\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<p>I've created a new page for you guys that I will try to keep updated. Internal Assessement reference and the Assume Breach Mindset. The purpose of this page (<a href=\"https:\/\/sirensecurity.io\/blog\/assume-breach-reference\/\">https:\/\/sirensecurity.io\/blog\/assume-breach-reference\/<\/a>) is to essentially provide you (as with all other things on this website) with a reference sheet for your internal network assessments or \"<em>remote internals<\/em>\". These are just some of the core commands that I usually work through during an engagement and they can be useful to help speed up your assessment while keeping things accurate and notated. <\/p>\n\n\n\n<p id=\"assume-breach-s1ren-reference\"><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/sirensecurity.io\/blog\/wp-content\/uploads\/2025\/05\/200w.gif\" alt=\"\" class=\"wp-image-751\" style=\"width:200px;height:auto\"\/><\/figure>\n<\/div>\n\n\n<figure class=\"wp-block-embed aligncenter is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"No Man\u2019s Sky - EOTWS Variation1\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/Znq03ZdBdZs?start=202&feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>I've created a new page for you guys that I will try to keep updated. Internal Assessement reference and the Assume Breach Mindset. The purpose of this page (https:\/\/sirensecurity.io\/blog\/assume-breach-reference\/) is to essentially provide you (as with all other things on this website) with a reference sheet for your internal network assessments or \"remote internals\". These [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":729,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[108,110,106,138,109,2,62,1],"tags":[161,160,162,29,38,163,164,4],"class_list":["post-750","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-assessment","category-blog","category-cybersecurity","category-infosec","category-penetration-test","category-s1ren","category-theory","category-uncategorized","tag-assessment","tag-internal","tag-notes","tag-penetration-testing","tag-reference","tag-remote-internal","tag-remote-internals","tag-s1ren"],"_links":{"self":[{"href":"https:\/\/sirensecurity.io\/blog\/wp-json\/wp\/v2\/posts\/750","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sirensecurity.io\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sirensecurity.io\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sirensecurity.io\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sirensecurity.io\/blog\/wp-json\/wp\/v2\/comments?post=750"}],"version-history":[{"count":7,"href":"https:\/\/sirensecurity.io\/blog\/wp-json\/wp\/v2\/posts\/750\/revisions"}],"predecessor-version":[{"id":760,"href":"https:\/\/sirensecurity.io\/blog\/wp-json\/wp\/v2\/posts\/750\/revisions\/760"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sirensecurity.io\/blog\/wp-json\/wp\/v2\/media\/729"}],"wp:attachment":[{"href":"https:\/\/sirensecurity.io\/blog\/wp-json\/wp\/v2\/media?parent=750"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sirensecurity.io\/blog\/wp-json\/wp\/v2\/categories?post=750"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sirensecurity.io\/blog\/wp-json\/wp\/v2\/tags?post=750"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}