Black Hills Information Security, Inc.
RSS
  • All Services
    • Complete Service Guide
    • Active SOC
    • AI Security Assessments
    • Blockchain Security
    • Blue Team Services
    • Continuous Penetration Testing
    • High-Profile Risk Assessments
    • Incident Response
    • Penetration Testing
  • Contact Us
    • Contact Us
    • Email Sign-Up
  • About Us
    • Security Consultants
    • Admin
    • SOC Team
    • Antisyphon Training
    • BHIS Family of Companies
  • Free Resources
    • Blogs
    • Free Cybersecurity Tools
    • Free Cybersecurity Webcasts
    • Podcasts
    • RITA
  • Training
    • BHIS & Antisyphon Training
    • WWHF Conference
  • Online Community
    • Discord
    • LinkedIn
    • YouTube
    • Bluesky
    • Twitter/X
    • Upcoming Events
  • Fun Stuff
    • Backdoors & Breaches
    • Merch, Zines & More
    • PROMPT# Zine
    • REKCAH
    • Books
aihackingpt2_header

Brian Fehrman, General InfoSec Tips & Tricks, Informational AI, Artificial Intelligence, Large Language Models, LLMs, Prompt Injection

Getting Started with AI Hacking Part 2: Prompt Injection

In Part 2, we’re diving headfirst into one of the most critical attack surfaces in the LLM ecosystem – Prompt Injection: The AI version of talking your way past the bouncer.

Read the entire post here
Win_logs_headerpt2

Blue Team Tools, How-To, Hunt Teaming, Incident Response, Informational, InfoSec 201 evtx, hayabusa, SOF-ELK

Wrangling Windows Event Logs with Hayabusa & SOF-ELK (Part 2)

But what if we need to wrangle Windows Event Logs for more than one system? In part 2, we’ll wrangle EVTX logs at scale by incorporating Hayabusa and SOF-ELK into my rapid endpoint investigation workflow (“REIW”)! 

Read the entire post here
domcat_header

How-To, Informational, InfoSec 201, Phishing, Recon, Red Team, Red Team Tools Domain Categorization, DomCat, Expired Domains, William Oldert

DomCat: A Domain Categorization Tool

DomCat is a command-line tool written in Golang that helps the user find expired domains with desirable categorizations.

Read the entire post here
Win_logs_header

Blue Team, How-To, Hunt Teaming, Incident Response, Informational, InfoSec 201 evtx, hayabusa, SOF-ELK

Wrangling Windows Event Logs with Hayabusa & SOF-ELK (Part 1)

In part 1 of this post, we’ll discuss how Hayabusa and “Security Operations and Forensics ELK” (SOF-ELK) can help us wrangle EVTX files (Windows Event Log files) for maximum effect during a Windows endpoint investigation!

Read the entire post here
msstore_header

Blue Team, David Fletcher, How-To, Informational Microsoft store, winget

Microsoft Store and WinGet: Security Risks for Corporate Environments

The Microsoft Store provides a convenient mechanism to install software without needing administrator permissions. The feature is convenient for non-corporate and home users but is unlikely to be acceptable in corporate environments. This is because attackers and malicious employees can use the Microsoft Store to install software that might violate organizational policy. 

Read the entire post here
default_web_header

Chris Sullo', General InfoSec Tips & Tricks, Informational, InfoSec 101, Web App

Default Web Content

Whether it’s forgotten temporary files, installation artifacts, READMEs, or even simple image files–default content on web servers can turn into a boon for attackers. In the most innocent of cases, these types of content can let attackers know more about the tech stack of the environment, and in the worst case scenario can lead to exploitation.

Read the entire post here
default_web_header (1)

Informational, Jack Hyland extension, Mailfail

MailFail

MailFail is a Firefox browser extension that identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdomain. The extension’s UI popup highlights any misconfigurations in red and links to the supporting documentation.

Read the entire post here
admin_utilities_header

Dale Hobbs, General InfoSec Tips & Tricks, Informational, InfoSec 101 CMD, PowerShell, RDP

Commonly Abused Administrative Utilities: A Hidden Risk to Enterprise Security 

Organizations tend to focus a significant amount of their efforts on external threats, such as phishing and ransomware, but they often overlook one of the most dangerous attack vectors on their internal networks. 

Read the entire post here
direct_send_header

Blue Team Tools, How-To, Hunt Teaming, Incident Response, Informational, InfoSec 201, Patterson Cake evtx, hayabusa, SOF-ELK

Stop Spoofing Yourself! Disabling M365 Direct Send

Remember the good ‘ol days of Zip drives, Winamp, the advent of “Office 365,” and copy machines that didn’t understand email authentication? Okay, maybe they weren’t so good! For a […]

Read the entire post here
‹ 1 2 3 4›»

Looking For Something?

Browse by category

Recent Posts

  • smart goals_header (1)How to Set Smart Goals (That Actually Work For You)
    Setting goals is a deceptively simple career skill we
  • socinterview_headerInside the BHIS SOC: A Conversation with Hayden Covington 
    What happens when you ditch the tiered ticket queues
  • del3_headerAbusing Delegation with Impacket (Part 3): Resource-Based Constrained Delegation
    This is the third in a three-part series of blog posts

Browse by topic

Active Directory ADHD AI anti-virus Attack Tactics AV Beau Bullock BHIS Blue Team C2 Carrie Roberts cloud Cyber Deception hacking Hashcat infosec Infosec for Beginners InfoSec Survival Guide Joff Thyer john strand Jordan Drysdale Kent Ickler Kerberos Linux MailSniper Microsoft Nessus Nmap passwords password spraying pen-testing penetration testing pentest Pentesting phishing PowerShell Python Red Team red teaming RITA Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security, Inc.

890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008


About Us | BHIS Tribe of Companies | Privacy Policy | Contact

Links
Search the site