Black Hills Information Security, Inc.
RSS
  • All Services
    • Complete Service Guide
    • Active SOC
    • AI Security Assessments
    • Blockchain Security
    • Blue Team Services
    • Continuous Penetration Testing
    • High-Profile Risk Assessments
    • Incident Response
    • Penetration Testing
  • Contact Us
    • Contact Us
    • Email Sign-Up
  • About Us
    • Security Consultants
    • Admin
    • SOC Team
    • Antisyphon Training
    • BHIS Tribe of Companies
  • Free Resources
    • Blogs
    • Free Cybersecurity Tools
    • Free Cybersecurity Webcasts
    • Podcasts
    • RITA
  • Training
    • BHIS & Antisyphon Training
    • WWHF Conference
  • Community
    • Discord
    • LinkedIn
    • YouTube
    • Bluesky
    • Twitter/X
    • Upcoming Events
  • Fun Stuff
    • Backdoors & Breaches
    • Merch, Zines & More
    • PROMPT# Zine
    • REKCAH
    • Books
BLOG_chalkboard_00631

External/Internal, How-To, Informational, Justin Angel Exfil

Evasive File Smuggling with Skyhook 

ImposterKeanu // Introduction  This blog post introduces the reader to “The Obfuscation Hustle”, a term I enjoy using to describe the tedious process of obfuscating and delivering files to corporate […]

Read the entire post here
BLOG_chalkboard_00632

Informational, InfoSec 101, Tom Smith Compliance, FTC, Incident Response, penetration testing, Safeguard Rule

Why Do Car Dealers Need Cybersecurity Services? 

Tom Smith // At Black Hills Information Security (BHIS), we deal with all manner of clients, public and private. Until a month or two ago, though, we’d never dealt with […]

Read the entire post here
BLOG_chalkboard_00630

Recon, Serena DiPenti

Shenetworks Recommends: Using Nmap Like a Pro 

shenetworks // One day at work I received a case stating a client couldn’t connect to the management interface of a new server. I asked the client to change the […]

Read the entire post here
00629_ 05242023_SixTipsForManagingPenetrationTestData

General InfoSec Tips & Tricks, How-To, Informational, InfoSec 101, John Malone Archive, data, testing

Six Tips for Managing Penetration Test Data

John Malone // Introduction Information is power. This sentiment also holds true when discussing the creation of a supporting archive. A supporting archive is something that we put together to […]

Read the entire post here
00628_05162023_DynamicDeviceCodePhishing

Blue Team, Incident Response, Informational, InfoSec 301, Phishing, Red Team, Social Engineering, Steve Borosh Device Code, Microsoft

Dynamic Device Code Phishing 

rvrsh3ll //  Introduction  This blog post is intended to give a light overview of device codes, access tokens, and refresh tokens. Here, I focus on the technical how-to for standing […]

Read the entire post here
BLOG_chalkboard_00627

Informational, Linux, moth Auditd, C, evasion

Auditd Field Spoofing: Now You Auditd Me, Now You Auditdon’t

moth // Introduction  One fateful night in June of 2022, Ethan sent a message to the crew: “Anyone know ways to fool Auditd on Linux? I’m trying to figure out how to change the auid (audit […]

Read the entire post here
BLOG_chalkboard_00625

Informational, Joseph Kingstone, Physical, Red Team

If You Don’t Ruse, You Lose: A Simple Guide to Blending in While Breaking In 

Joseph Kingstone // Are you assigned a physical penetration test and want to fly under the radar and meet all of your objectives like the elite hacker you are? Stick around […]

Read the entire post here
BLOG_chalkboard_00624

General InfoSec Tips & Tricks, Informational, InfoSec 101, Serena DiPenti Infosec for Beginners, Pentesting

Shenetworks Recommends: 9 Must Watch BHIS YouTube Videos

shenetworks // The Black Hills Information Security YouTube channel has over 400 videos available. Over the past year, I have attended many webcasts and explored plenty of the videos. I […]

Read the entire post here
MicrosoftTeams-image (17)

Informational

Genymotion – Proxying Android App Traffic Through Burp Suite | Cameron Cartier

Mobile App Testing is a category showing no signs of slowing down. In this video, BHIS tester Cameron Cartier walks us through linking Genymotion to Burp Suite for traffic monitoring. […]

Read the entire post here
«‹ 16 17 18 19›»

Looking For Something?

Browse by category

Recent Posts

  • deceptiveaud_header (2)Deceptive-Auditing: An Active Directory Honeypots Tool
    Deceptive-Auditing is a tool that deploys Active
  • The Curious Case of the ComburglarThe Curious Case of the Comburglar
    By Troy Wojewoda During a recent Breach Assessment
  • smart goals_header (1)How to Set Smart Goals (That Actually Work For You)
    Setting goals is a deceptively simple career skill we

Browse by topic

Active Directory ADHD AI anti-virus Attack Tactics AV Beau Bullock BHIS Blue Team C2 Carrie Roberts cloud Cyber Deception hacking Hashcat infosec Infosec for Beginners InfoSec Survival Guide Joff Thyer john strand Jordan Drysdale Kent Ickler Kerberos Linux MailSniper Microsoft Nessus Nmap passwords password spraying pen-testing penetration testing pentest Pentesting phishing PowerShell Python Red Team red teaming RITA Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security, Inc.

890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008


About Us | BHIS Tribe of Companies | Privacy Policy | Contact

Links
Search the site