Black Hills Information Security, Inc.
RSS
  • All Services
    • Complete Service Guide
    • Active SOC
    • AI Security Assessments
    • Blockchain Security
    • Blue Team Services
    • Continuous Penetration Testing
    • High-Profile Risk Assessments
    • Incident Response
    • Penetration Testing
  • Contact Us
    • Contact Us
    • Email Sign-Up
  • About Us
    • Security Consultants
    • Admin
    • SOC Team
    • Antisyphon Training
    • BHIS Tribe of Companies
  • Free Resources
    • Blogs
    • Free Cybersecurity Tools
    • Free Cybersecurity Webcasts
    • Podcasts
    • RITA
  • Training
    • BHIS & Antisyphon Training
    • WWHF Conference
  • Community
    • Discord
    • LinkedIn
    • YouTube
    • Bluesky
    • Twitter/X
    • Upcoming Events
  • Fun Stuff
    • Backdoors & Breaches
    • Merch, Zines & More
    • PROMPT# Zine
    • REKCAH
    • Books
BLOG_chalkboard_00682

General InfoSec Tips & Tricks, Guest Author, InfoSec 101 burnout, Infosec for Beginners, InfoSec Survival Guide, Mental health

Mental Health – An Infosec Challenge

by Amanda Berlin of Mental Health Hackers This article was originally published in the second edition of the InfoSec Survival Guide. Find it free online HERE or order your $1 […]

Read the entire post here
BLOG_chalkboard_00681

InfoSec 101, Intern, Password Cracking, Red Team, Red Team Tools, Wireless

WifiForge – WiFi Exploitation for the Classroom

by William Oldert // BHIS Intern BHIS had a problem.   We needed an environment for students to learn WiFi hacking safely. Our original solution used interconnected physical network gear […]

Read the entire post here
BLOG_chalkboard_00680 (1)

General InfoSec Tips & Tricks, Guest Author, How-To, Informational, InfoSec 101 home lab, Infosec for Beginners, InfoSec Survival Guide, virtual machines

Build a Home Lab: Equipment, Tools, and Tips

by Martin Pearson || Guest Author This article was originally published in the second edition of the InfoSec Survival Guide. Find it free online HERE or order your $1 physical […]

Read the entire post here
BLOG_chalkboard_00679 (1)

External/Internal, General InfoSec Tips & Tricks, How-To, InfoSec 201 audit, GitLab, gitleaks, leaks, secrets

Auditing GitLab: Public Gitlab Projects on Internal Networks

A great place that can sometimes be overlooked on an internal penetration test are the secrets hidden in plain sight. That is, a place where no authentication is required in […]

Read the entire post here
BLOG_chalkboard_000678

Connor Costigan, Hardware Hacking, Informational, Mobile Android, LineageOS, ROM Flashing

How to Install LineageOS on Your Android Device 

Hey guys, my name is Connor. I am a web developer here at BHIS who also loves hacking phones. Particularly, Android phones! Today, I am going to show you the basics […]

Read the entire post here
Slackenum_header

How-To, Informational, Michael Allen, Recon, Red Team, Red Team Tools, Web App

Introducing SlackEnum: A User Enumeration Tool for Slack

Recently, as part of our ANTISOC Continuous Penetration Testing (CPT) service, I had an opportunity to investigate how attackers can leverage Slack in cyber-attacks, similar to how we frequently use […]

Read the entire post here
cyberninja_header

Carrie Roberts, General InfoSec Tips & Tricks, How-To, Informational, InfoSec 101 Getting Started In InfoSec, Infosec for Beginners, training

From High School to Cyber Ninja—For Free (Almost)!

| Carrie Roberts // Guest Author Carrie Roberts is an Antisyphon instructor and experienced cyber security professional who has mentored many on their journey into cyber. My name is Carrie […]

Read the entire post here
AD_pt4header (2)

David Fletcher, Informational, Red Team macros, Microsoft 365

Augmenting Security Testing and Analysis Activities with Microsoft 365 Products

Use of Microsoft 365 products in security testing is not a new concept. For a long time, I’ve incorporated various activities using Office products into my testing regimen. In the […]

Read the entire post here
DLL Jmping: Old Hollow Trampolines in Windows DLL Land

Debjeet Banerjee, General InfoSec Tips & Tricks, Informational, InfoSec 201, Red Team, Red Team Tools

DLL Jmping: Old Hollow Trampolines in Windows DLL Land

DLL hollowing is an age-old technique used by malware authors to have a memory-backed shellcode. However, defensive mechanisms like CFG and XFG have made it incredibly difficult to implement such […]

Read the entire post here
«‹ 11 12 13 14›»

Looking For Something?

Browse by category

Recent Posts

  • deadwood_headerWhen the SOC Goes to Deadwood: A Night to Remember 
    Hear a tale about the time the BHIS SOC team conducted
  • Social Engineering and Microsoft SSPRSocial Engineering and Microsoft SSPR: The Road to Pwnage is Paved with Good Intentions 
    This scenario simultaneously tests identity
  • cyber threats_headerCommon Cyber Threats
    In today’s interconnected digital world, information

Browse by topic

Active Directory ADHD AI anti-virus Attack Tactics AV Beau Bullock BHIS Blue Team C2 Carrie Roberts cloud Cyber Deception hacking Hashcat infosec Infosec for Beginners InfoSec Survival Guide Joff Thyer john strand Jordan Drysdale Kent Ickler Kerberos Linux MailSniper Microsoft Nessus Nmap passwords password spraying pen-testing penetration testing pentest Pentesting phishing PowerShell Python Red Team red teaming RITA Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security, Inc.

890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008


About Us | BHIS Tribe of Companies | Privacy Policy | Contact

Links
Search the site