Black Hills Information Security, Inc.
RSS
  • All Services
    • Complete Service Guide
    • Active SOC
    • AI Security Assessments
    • Blockchain Security
    • Blue Team Services
    • Continuous Penetration Testing
    • High-Profile Risk Assessments
    • Incident Response
    • Penetration Testing
  • Contact Us
    • Contact Us
    • Email Sign-Up
  • About Us
    • Security Consultants
    • Admin
    • SOC Team
    • BHIS Family of Companies
  • Free Resources
    • Blogs
    • Free Cybersecurity Tools
    • Free Cybersecurity Webcasts
    • Podcasts
    • RITA
  • Training
    • BHIS & Antisyphon Training
    • WWHF Conference
  • Online Community
    • Discord
    • LinkedIn
    • YouTube
    • Bluesky
    • Twitter/X
    • Upcoming Events
  • Fun Stuff
    • Backdoors & Breaches
    • Merch, Zines & More
    • PROMPT# Zine
    • REKCAH
    • Books
domcat_header

How-To, Informational, InfoSec 201, Phishing, Recon, Red Team, Red Team Tools Domain Categorization, DomCat, Expired Domains, William Oldert

DomCat: A Domain Categorization Tool

DomCat is a command-line tool written in Golang that helps the user find expired domains with desirable categorizations.

Read the entire post here
Win_logs_header

Blue Team, How-To, Hunt Teaming, Incident Response, Informational, InfoSec 201 evtx, hayabusa, SOF-ELK

Wrangling Windows Event Logs with Hayabusa & SOF-ELK (Part 1)

In part 1 of this post, we’ll discuss how Hayabusa and “Security Operations and Forensics ELK” (SOF-ELK) can help us wrangle EVTX files (Windows Event Log files) for maximum effect during a Windows endpoint investigation!

Read the entire post here
msstore_header

Blue Team, David Fletcher, How-To, Informational Microsoft store, winget

Microsoft Store and WinGet: Security Risks for Corporate Environments

The Microsoft Store provides a convenient mechanism to install software without needing administrator permissions. The feature is convenient for non-corporate and home users but is unlikely to be acceptable in corporate environments. This is because attackers and malicious employees can use the Microsoft Store to install software that might violate organizational policy. 

Read the entire post here
default_web_header

Chris Sullo', General InfoSec Tips & Tricks, Informational, InfoSec 101, Web App

Default Web Content

Whether it’s forgotten temporary files, installation artifacts, READMEs, or even simple image files–default content on web servers can turn into a boon for attackers. In the most innocent of cases, these types of content can let attackers know more about the tech stack of the environment, and in the worst case scenario can lead to exploitation.

Read the entire post here
default_web_header (1)

Informational, Jack Hyland extension, Mailfail

MailFail

MailFail is a Firefox browser extension that identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdomain. The extension’s UI popup highlights any misconfigurations in red and links to the supporting documentation.

Read the entire post here
admin_utilities_header

Dale Hobbs, General InfoSec Tips & Tricks, Informational, InfoSec 101 CMD, PowerShell, RDP

Commonly Abused Administrative Utilities: A Hidden Risk to Enterprise Security 

Organizations tend to focus a significant amount of their efforts on external threats, such as phishing and ransomware, but they often overlook one of the most dangerous attack vectors on their internal networks. 

Read the entire post here
direct_send_header

Blue Team Tools, How-To, Hunt Teaming, Incident Response, Informational, InfoSec 201, Patterson Cake evtx, hayabusa, SOF-ELK

Stop Spoofing Yourself! Disabling M365 Direct Send

Remember the good ‘ol days of Zip drives, Winamp, the advent of “Office 365,” and copy machines that didn’t understand email authentication? Okay, maybe they weren’t so good! For a […]

Read the entire post here
Introducing JSONPeek and CSP B Gone

Informational, Jack Hyland, Red Team, Web App CSP, CSP B Gone, JSONPeek

Bypassing CSP with JSONP: Introducing JSONPeek and CSP B Gone

A Content Security Policy (CSP) is a security mechanism implemented by web servers and enforced by browsers to prevent various types of attacks, primarily cross-site scripting (XSS). CSP works by restricting resources (scripts, stylesheets, images, etc.) on a webpage to only execute if they come from approved sources. However, like most things in security, CSP isn’t bulletproof.

Read the entire post here
BLOG_cheatsheet_

Informational, InfoSec 101, Red Team, Red Team Tools Cheatsheets, Infosec for Beginners, InfoSec Survival Guide

Offensive Tooling Cheatsheets: An Infosec Survival Guide Resource

An Infosec Survival Guide Resource, released as blog posts, with fully designed, printer-friendly PDF cheatsheets.

Read the entire post here
‹ 1 2 3 4›»

Looking For Something?

Browse by category

Recent Posts

  • del3_headerAbusing Delegation with Impacket (Part 3): Resource-Based Constrained Delegation
    This is the third in a three-part series of blog posts
  • HACKED2025_headerWhy You Got Hacked – 2025 Super Edition
    This article was written to provide readers with an
  • del2_headerAbusing Delegation with Impacket (Part 2): Constrained Delegation
    This is the second in a three-part series of blog

Browse by topic

Active Directory ADHD AI anti-virus Attack Tactics AV Beau Bullock BHIS Blue Team C2 Carrie Roberts cloud Cyber Deception hacking Hashcat infosec Infosec for Beginners InfoSec Survival Guide Joff Thyer john strand Jordan Drysdale Kent Ickler Kerberos Linux MailSniper Microsoft Nessus Nmap passwords password spraying pen-testing penetration testing pentest Pentesting phishing PowerShell Python Red Team red teaming RITA Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security, Inc.

890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008


About Us | BHIS Tribe of Companies | Privacy Policy | Contact

Links
Search the site