Black Hills Information Security, Inc.
RSS
  • All Services
    • Complete Service Guide
    • Active SOC
    • AI Security Assessments
    • Blockchain Security
    • Blue Team Services
    • Continuous Penetration Testing
    • High-Profile Risk Assessments
    • Incident Response
    • Penetration Testing
  • Contact Us
    • Contact Us
    • Email Sign-Up
  • About Us
    • Security Consultants
    • Admin
    • SOC Team
    • Antisyphon Training
    • BHIS Family of Companies
  • Free Resources
    • Blogs
    • Free Cybersecurity Tools
    • Free Cybersecurity Webcasts
    • Podcasts
    • RITA
  • Training
    • BHIS & Antisyphon Training
    • WWHF Conference
  • Online Community
    • Discord
    • LinkedIn
    • YouTube
    • Bluesky
    • Twitter/X
    • Upcoming Events
  • Fun Stuff
    • Backdoors & Breaches
    • Merch, Zines & More
    • PROMPT# Zine
    • REKCAH
    • Books
BLOG_chalkboard_00685

Bronwen Aker, Fun & Games, General InfoSec Tips & Tricks, How-To, Informational AI, Chatbots, ChatGPT, LLM

Crafting the Perfect Prompt: Getting the Most Out of ChatGPT and Other LLMs

| Bronwen Aker // Sr. Technical Editor, M.S. Cybersecurity, GSEC, GCIH, GCFE Go online these days and you will see tons of articles, posts, Tweets, TikToks, and videos about how […]

Read the entire post here
BLOG_chalkboard_00684

Ashley Knowles, Informational, Phishing, Red Team, Social Engineering InfoSec Survival Guide

How to Perform and Combat Social Engineering

This article was originally published in the second edition of the InfoSec Survival Guide. Find it free online HERE or order your $1 physical copy on the Spearphish General Store. […]

Read the entire post here
BLOG_chalkboard_00683

Cameron Cartier, General InfoSec Tips & Tricks, Informational, InfoSec 101, Recon, Wireless Kismet, wifi

Ghost in the Wireless: An introduction to Airspace Analysis with KismetĀ 

This is the first installment in a series of blogs relating to practical analysis of wireless communications: what they are, how they work, and how they can be attacked. In […]

Read the entire post here
BLOG_chalkboard_00682

General InfoSec Tips & Tricks, Guest Author, InfoSec 101 burnout, Infosec for Beginners, InfoSec Survival Guide, Mental health

Mental Health – An Infosec Challenge

by Amanda Berlin of Mental Health Hackers This article was originally published in the second edition of the InfoSec Survival Guide. Find it free online HERE or order your $1 […]

Read the entire post here
BLOG_chalkboard_00681

InfoSec 101, Intern, Password Cracking, Red Team, Red Team Tools, Wireless

WifiForge – WiFi Exploitation for the Classroom

by William Oldert // BHIS Intern BHIS had a problem.   We needed an environment for students to learn WiFi hacking safely. Our original solution used interconnected physical network gear […]

Read the entire post here
BLOG_chalkboard_00680 (1)

General InfoSec Tips & Tricks, Guest Author, How-To, Informational, InfoSec 101 home lab, Infosec for Beginners, InfoSec Survival Guide, virtual machines

Build a Home Lab: Equipment, Tools, and Tips

by Martin Pearson || Guest Author This article was originally published in the second edition of the InfoSec Survival Guide. Find it free online HERE or order your $1 physical […]

Read the entire post here
BLOG_chalkboard_00679 (1)

External/Internal, General InfoSec Tips & Tricks, How-To, InfoSec 201 audit, GitLab, gitleaks, leaks, secrets

Auditing GitLab: Public Gitlab Projects on Internal Networks

A great place that can sometimes be overlooked on an internal penetration test are the secrets hidden in plain sight. That is, a place where no authentication is required in […]

Read the entire post here
BLOG_chalkboard_000678

Connor Costigan, Hardware Hacking, Informational, Mobile Android, LineageOS, ROM Flashing

How to Install LineageOS on Your Android DeviceĀ 

Hey guys, my name is Connor. I am a web developer here at BHIS who also loves hacking phones. Particularly, Android phones! Today, I am going to show you the basics […]

Read the entire post here
Slackenum_header

How-To, Informational, Michael Allen, Recon, Red Team, Red Team Tools, Web App

Introducing SlackEnum: A User Enumeration Tool for Slack

Recently, as part of our ANTISOC Continuous Penetration Testing (CPT) service, I had an opportunity to investigate how attackers can leverage Slack in cyber-attacks, similar to how we frequently use […]

Read the entire post here
«‹ 10 11 12 13›»

Looking For Something?

Browse by category

Recent Posts

  • smart goals_header (1)How to Set Smart Goals (That Actually Work For You)
    Setting goals is a deceptively simple career skill we
  • socinterview_headerInside the BHIS SOC: A Conversation with Hayden CovingtonĀ 
    What happens when you ditch the tiered ticket queues
  • del3_headerAbusing Delegation with Impacket (Part 3): Resource-Based Constrained Delegation
    This is the third in a three-part series of blog posts

Browse by topic

Active Directory ADHD AI anti-virus Attack Tactics AV Beau Bullock BHIS Blue Team C2 Carrie Roberts cloud Cyber Deception hacking Hashcat infosec Infosec for Beginners InfoSec Survival Guide Joff Thyer john strand Jordan Drysdale Kent Ickler Kerberos Linux MailSniper Microsoft Nessus Nmap passwords password spraying pen-testing penetration testing pentest Pentesting phishing PowerShell Python Red Team red teaming RITA Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security, Inc.

890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008


About Us | BHIS Tribe of Companies | Privacy Policy | Contact

Links
Search the site