Black Hills Information Security, Inc.
RSS
  • All Services
    • Complete Service Guide
    • Active SOC
    • AI Security Assessments
    • Blockchain Security
    • Blue Team Services
    • Continuous Penetration Testing
    • High-Profile Risk Assessments
    • Incident Response
    • Penetration Testing
  • Contact Us
    • Contact Us
    • Email Sign-Up
  • About Us
    • Security Consultants
    • Admin
    • SOC Team
    • Antisyphon Training
    • BHIS Tribe of Companies
  • Free Resources
    • Blogs
    • Free Cybersecurity Tools
    • Free Cybersecurity Webcasts
    • Podcasts
    • RITA
  • Training
    • BHIS & Antisyphon Training
    • WWHF Conference
  • Community
    • Discord
    • LinkedIn
    • YouTube
    • Bluesky
    • Twitter/X
    • Upcoming Events
  • Fun Stuff
    • Backdoors & Breaches
    • Merch, Zines & More
    • PROMPT# Zine
    • REKCAH
    • Books
Hit the Ground Running with Prototype Pollution  

Finding, How-To, Informational, Isaac Burton, Web App Prototype Pollution, Web API

Hit the Ground Running with Prototype Pollution  

Isaac Burton // For as long as we have known about prototype pollution vulnerabilities, there has been confusion on what they are and how they can be exploited. We’re going […]

Read the entire post here
BLOG_chalkboard_00617

Fernando Panizza, General InfoSec Tips & Tricks, How-To, Informational

Forwarding Traffic Through SSH

Fernando Panizza // This was meant to be an OpenSSH how-to blog, but since I had time, I decided to read the man pages (manual pages that you can access […]

Read the entire post here
BLOG_chalkboard_00615

How-To, Joseph Kingstone, Physical

Tales From the Pick: Intro to Physical Security Tools

Joseph Kingstone // Looking to get into physical security? Not sure what you need to get started? Look no further.  What are Physical Security Assessments?   Physical security assessments evaluate an […]

Read the entire post here
BLOG_chalkboard_00616

Alyssa Snow, External/Internal, General InfoSec Tips & Tricks, How-To, Informational, Recon, Web App

Gowitness, a Tester’s Time Saver

Alyssa Snow // During an external or internal network penetration test, it can be challenging to comb through each web server in scope to find the juicy stuff. During a […]

Read the entire post here
MITM6 Strikes Again: The Dark Side of IPv6  

Dale Hobbs, External/Internal, How-To, Informational, InfoSec 201 IPv6, Machine-in-the-Middle, MITM6, ntlmrelayx, Replication-Get-Changes-All

MITM6 Strikes Again: The Dark Side of IPv6  

Dale Hobbs // As the world becomes increasingly connected through the internet, cyber attacks have become more sophisticated and prevalent. One type of attack that you may not have heard […]

Read the entire post here
BLOG_chalkboard_ (1)

Informational, moth Exploit Development, Python, Scapy, TCPDump, Vulnerability, Wireshark

Exploit Development – A Sincere Form of Flattery

moth // Recently, BHIS penetration tester Dale Hobbs was on an Internal Network Penetration Test and came across an RPC-based arbitrary command execution vulnerability in his vulnerability scan results.  I […]

Read the entire post here
BLOG_chalkboard_00612

Blue Team, DFIR, General InfoSec Tips & Tricks, Hal Denton, How-To, Informational Digital Forensics and Incident Response, Master Boot Record

Who’s Bootin’? Dissecting the Master Boot Record

Hal Denton // Have you ever been given an encrypted hard drive to perform forensic analysis on? What could go wrong? Probably the first thought rolling through your mind is […]

Read the entire post here
BLOG_chalkboard_00611

External/Internal, How-To, Mobile, Password Spray, Red Team, Sean Verity, Web App

How to Build a Pentest Robot With Selenium IDE

Have you ever been on a pentest and thought to yourself, “I wish I had a robot to do this testing for me right now cuz this is just too much work”?

Read the entire post here
BLOG_chalkboard_00610

Daniel Pizarro, External/Internal, General InfoSec Tips & Tricks, Informational, LLMNR, Password Cracking, Password Spray, Recon, Red Team, Red Team Tools, Web App Cybersecurity Certification, PNPT

PNPT: Certification Review

Daniel Pizarro // What is the PNPT?  The Practical Network Penetration Tester (PNPT), created by TCM Security (TCMS), is a 5-day ethical hacking certification exam that assesses a pentester’s ability […]

Read the entire post here
«‹ 18 19 20 21›»

Looking For Something?

Browse by category

Recent Posts

  • deadwood_headerWhen the SOC Goes to Deadwood: A Night to Remember 
    Hear a tale about the time the BHIS SOC team conducted
  • Social Engineering and Microsoft SSPRSocial Engineering and Microsoft SSPR: The Road to Pwnage is Paved with Good Intentions 
    This scenario simultaneously tests identity
  • cyber threats_headerCommon Cyber Threats
    In today’s interconnected digital world, information

Browse by topic

Active Directory ADHD AI anti-virus Attack Tactics AV Beau Bullock BHIS Blue Team C2 Carrie Roberts cloud Cyber Deception hacking Hashcat infosec Infosec for Beginners InfoSec Survival Guide Joff Thyer john strand Jordan Drysdale Kent Ickler Kerberos Linux MailSniper Microsoft Nessus Nmap passwords password spraying pen-testing penetration testing pentest Pentesting phishing PowerShell Python Red Team red teaming RITA Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security, Inc.

890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008


About Us | BHIS Tribe of Companies | Privacy Policy | Contact

Links
Search the site