Black Hills Information Security, Inc.
RSS
  • All Services
    • Complete Service Guide
    • Active SOC
    • AI Security Assessments
    • Blockchain Security
    • Blue Team Services
    • Continuous Penetration Testing
    • High-Profile Risk Assessments
    • Incident Response
    • Penetration Testing
  • Contact Us
    • Contact Us
    • Email Sign-Up
  • About Us
    • Security Consultants
    • Admin
    • SOC Team
    • Antisyphon Training
    • BHIS Tribe of Companies
  • Free Resources
    • Blogs
    • Free Cybersecurity Tools
    • Free Cybersecurity Webcasts
    • Podcasts
    • RITA
  • Training
    • BHIS & Antisyphon Training
    • WWHF Conference
  • Community
    • Discord
    • LinkedIn
    • YouTube
    • Bluesky
    • Twitter/X
    • Upcoming Events
  • Fun Stuff
    • Backdoors & Breaches
    • Merch, Zines & More
    • PROMPT# Zine
    • REKCAH
    • Books
BLOG_chalkboard_00693

Blue Team, Hayden Covington, Informational, InfoSec 101 Security Operations Center, SOC

Clear, Concise, and Comprehensive: The Formula for Great SOC Tickets

A lot of emphasis and focus is put on the investigative part of SOC work, with the documentation and less glamorous side of things brushed under the rug. One such […]

Read the entire post here
WC_wrap-up_W0002

Informational, Matthew Eidelberg, Red Team, Red Team Tools, Webcasts DLL, DLL Hijacking, Webcast Wrap-Up

DLL Hijacking – A New Spin on Proxying your Shellcode

This webcast was originally published on October 4, 2024. In this video, experts delve into the intricacies of DLL hijacking and new techniques for malicious code proxying, featuring a comprehensive […]

Read the entire post here
BLOG_chalkboard_00692

Blue Team, Blue Team Tools, Guest Author, Informational, InfoSec 101, Red Team, Red Team Tools Infosec for Beginners, InfoSec Survival Guide, Purple Team

Blue Team, Red Team, and Purple Team: An Overview

By Erik Goldoff, Ray Van Hoose, and Max Boehner || Guest Authors This post is comprised of 3 articles that were originally published in the second edition of the InfoSec […]

Read the entire post here
WC_wrap-up_W0001

Informational, Kevin Klingbile, Recon, Webcasts Azure Cloud, Cloud Enum, Cred Master, Graph Runner, M365, Pen Testing, Webcast Wrap-Up

Reconnaissance: Azure Cloud w/ Kevin Klingbile

This webcast was originally published on September 26, 2024. In this video, Kevin Klingbile from Black Hills Information Security discusses the intricacies of Azure Cloud services and M365, focusing on […]

Read the entire post here
BLOG_chalkboard_00689

Hardware Hacking, How-To, Informational, Intern cFS, ground stations, Python, RF attack chaining, Satellite Hacking, Space systems, Tim Fowler

Satellite Hacking

by Austin Kaiser // Intern Hacking a satellite is not a new thing. Satellites have been around since 1957. The first satellite launched was called Sputnik 1 and was launched […]

Read the entire post here
BLOG_chalkboard_000691

C2, External/Internal, Matthew Eidelberg, Red Team, Red Team Tools Exploit Dev, Malware Dev

Proxying Your Way to Code Execution – A Different Take on DLL Hijacking 

While DLL hijacking attacks can take on many different forms, this blog post will explore a specific type of attack called DLL proxying, providing insights into how it works, the potential risks it poses, and briefly the methodology for discovering these vulnerable DLLs, which led to the discovery of several zero-day vulnerable DLLs that Microsoft has acknowledged but opted to not fix at this time.

Read the entire post here
WC_wrap-up_w0003

Informational, James Marrs, Kiersten Gross, Webcast Wrap-Up, Webcasts Audit Inspector, Cyber Investigation, Logging, Sysmon, Windows logs

How Logging Strategies Can Affect Cyber Investigations w/ Kiersten & James 

This webcast was originally published on September 12, 2024.   In this video, Kirsten Gross and James Marrs discuss how logging strategies can affect cyber investigations, specifically focusing on Windows logs. […]

Read the entire post here
msDS-KeyCredentialLink_header

Blue Team, Incident Response, Informational, Jordan Drysdale Blue Team Detections, detection engineering, event auditing, msDS-KeyCredentialLink, Shadow creds

Enable Auditing of Changes to msDS-KeyCredentialLink 

Changes to the msds-KeyCredentialLink attribute are not audited/logged with standard audit configurations. This required serious investigations and a partner firm in infosec provided us the answer: TrustedSec.  So, credit where […]

Read the entire post here
BLOG_chalkboard_000687

Blue Team, David Perez, Incident Response, Informational Azure, Entra ID, SIEM, SOC

Monitoring High Risk Azure Logins 

Recently in the SOC, we were notified by a partner that they had a potential business email compromise, or BEC. We commonly catch these by identifying suspicious email forwarding rules, […]

Read the entire post here
«‹ 9 10 11 12›»

Looking For Something?

Browse by category

Recent Posts

  • deceptiveaud_header (2)Deceptive-Auditing: An Active Directory Honeypots Tool
    Deceptive-Auditing is a tool that deploys Active
  • The Curious Case of the ComburglarThe Curious Case of the Comburglar
    By Troy Wojewoda During a recent Breach Assessment
  • smart goals_header (1)How to Set Smart Goals (That Actually Work For You)
    Setting goals is a deceptively simple career skill we

Browse by topic

Active Directory ADHD AI anti-virus Attack Tactics AV Beau Bullock BHIS Blue Team C2 Carrie Roberts cloud Cyber Deception hacking Hashcat infosec Infosec for Beginners InfoSec Survival Guide Joff Thyer john strand Jordan Drysdale Kent Ickler Kerberos Linux MailSniper Microsoft Nessus Nmap passwords password spraying pen-testing penetration testing pentest Pentesting phishing PowerShell Python Red Team red teaming RITA Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security, Inc.

890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008


About Us | BHIS Tribe of Companies | Privacy Policy | Contact

Links
Search the site