Black Hills Information Security, Inc.
RSS
  • All Services
    • Complete Service Guide
    • Active SOC
    • AI Security Assessments
    • Blockchain Security
    • Blue Team Services
    • Continuous Penetration Testing
    • High-Profile Risk Assessments
    • Incident Response
    • Penetration Testing
  • Contact Us
    • Contact Us
    • Email Sign-Up
  • About Us
    • Security Consultants
    • Admin
    • SOC Team
    • Antisyphon Training
    • BHIS Tribe of Companies
  • Free Resources
    • Blogs
    • Free Cybersecurity Tools
    • Free Cybersecurity Webcasts
    • Podcasts
    • RITA
  • Training
    • BHIS & Antisyphon Training
    • WWHF Conference
  • Community
    • Discord
    • LinkedIn
    • YouTube
    • Bluesky
    • Twitter/X
    • Upcoming Events
  • Fun Stuff
    • Backdoors & Breaches
    • Merch, Zines & More
    • PROMPT# Zine
    • REKCAH
    • Books
cyber threats_header

Guest Author, Informational, InfoSec 101 Green Book, Infosec for Beginners, InfoSec Survival Guide

Common Cyber Threats

In today’s interconnected digital world, information security has become a critical concern for individuals, businesses, and governments alike. Cyber threats, which encompass a wide range of malicious activities targeting information systems, pose significant risks to the confidentiality, integrity, and availability of data.

Read the entire post here
pentest_header

General InfoSec Tips & Tricks, Informational Melisa Wachs, penetration testing

Finding the Right Penetration Testing Company

This blog is for anyone who is interested in finding a good penetration testing company.

Read the entire post here
deceptiveaud_header (2)

Blue Team Tools, How-To, Informational, Intern Active Directory, automation, Honey Pots

Deceptive-Auditing: An Active Directory Honeypots Tool

Deceptive-Auditing is a tool that deploys Active Directory honeypots and automatically enables auditing for those honeypots.

Read the entire post here
The Curious Case of the Comburglar

Active SOC, Breach Assessment, DFIR, Informational, Threat Hunting, Threat Intelligence, Troy Wojewoda

The Curious Case of the Comburglar

By Troy Wojewoda During a recent Breach Assessment engagement, BHIS discovered a highly stealthy and persistent intrusion technique utilized by a threat actor to maintain Command-and-Control (C2) within the client’s […]

Read the entire post here
smart goals_header (1)

General InfoSec Tips & Tricks, Guest Author, Informational, InfoSec 101 Green Book, Infosec for Beginners, InfoSec Survival Guide

How to Set Smart Goals (That Actually Work For You)

Setting goals is a deceptively simple career skill we all know is important, but how do you set goals you’re actually excited to work towards?

Read the entire post here
socinterview_header

Blue Team, Incident Response, Informational BHISinterviews, Hayden Covington, Melissa Lauro, Security Operations Center, SOC

Inside the BHIS SOC: A Conversation with Hayden Covington 

What happens when you ditch the tiered ticket queues and replace them with collaboration, agility, and real-time response? In this interview, Hayden Covington takes us behind the scenes of the BHIS Security Operations Center, which is where analysts don’t escalate tickets, they solve them.

Read the entire post here
del3_header

How-To, Informational Active Directory, Hunter Wade, Impacket, Kerberos

Abusing Delegation with Impacket (Part 3): Resource-Based Constrained Delegation

This is the third in a three-part series of blog posts discussing how to abuse Kerberos delegation! If you haven’t already, feel free to read the first blog post, as they discuss the Kerberos authentication process and how delegation plays an important role in solving the double-hop problem, and how to abuse unconstrained delegation.

Read the entire post here
HACKED2025_header

C2, External/Internal, Finding, Informational, Jordan Drysdale, Web App analysis, Report Findings

Why You Got Hacked – 2025 Super Edition

This article was written to provide readers with an overview of a selection of our pentest results from the last 15 months. This data was gathered toward the end of September 2025. Shockingly, the data does not differ much from our prior analyses conducted at the end of 2022 or 2023.

Read the entire post here
del2_header

How-To, Informational Active Directory, Hunter Wade, Impacket, Kerberos

Abusing Delegation with Impacket (Part 2): Constrained Delegation

This is the second in a three-part series of blog posts discussing how to abuse Kerberos delegation! If you haven’t already, feel free to read the first blog post, as it discusses the Kerberos authentication process and how delegation plays an important role in solving the double-hop problem.

Read the entire post here
1 2 3 4›»

Looking For Something?

Browse by category

Recent Posts

  • cyber threats_headerCommon Cyber Threats
    In today’s interconnected digital world, information
  • pentest_headerFinding the Right Penetration Testing Company
    This blog is for anyone who is interested in finding a
  • deceptiveaud_header (2)Deceptive-Auditing: An Active Directory Honeypots Tool
    Deceptive-Auditing is a tool that deploys Active

Browse by topic

Active Directory ADHD AI anti-virus Attack Tactics AV Beau Bullock BHIS Blue Team C2 Carrie Roberts cloud Cyber Deception hacking Hashcat infosec Infosec for Beginners InfoSec Survival Guide Joff Thyer john strand Jordan Drysdale Kent Ickler Kerberos Linux MailSniper Microsoft Nessus Nmap passwords password spraying pen-testing penetration testing pentest Pentesting phishing PowerShell Python Red Team red teaming RITA Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security, Inc.

890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008


About Us | BHIS Tribe of Companies | Privacy Policy | Contact

Links
Search the site