Black Hills Information Security, Inc.
RSS
  • All Services
    • Complete Service Guide
    • Active SOC
    • AI Security Assessments
    • Blockchain Security
    • Blue Team Services
    • Continuous Penetration Testing
    • High-Profile Risk Assessments
    • Incident Response
    • Penetration Testing
  • Contact Us
    • Contact Us
    • Email Sign-Up
  • About Us
    • Security Consultants
    • Admin
    • SOC Team
    • Antisyphon Training
    • BHIS Family of Companies
  • Free Resources
    • Blogs
    • Free Cybersecurity Tools
    • Free Cybersecurity Webcasts
    • Podcasts
    • RITA
  • Training
    • BHIS & Antisyphon Training
    • WWHF Conference
  • Online Community
    • Discord
    • LinkedIn
    • YouTube
    • Bluesky
    • Twitter/X
    • Upcoming Events
  • Fun Stuff
    • Backdoors & Breaches
    • Merch, Zines & More
    • PROMPT# Zine
    • REKCAH
    • Books
DNS Over HTTPS for Cobalt Strike

Author, Informational, InfoSec 101, Kyle Avery, Red Team

DNS Over HTTPS for Cobalt Strike

Kyle Avery // Introduction Setting up the C2 infrastructure for red team engagements has become more and more of a hassle in recent years. This is a win for the […]

Read the entire post here
BLOG_chalkboard_00570

Author, How-To, Informational, Max Boehner, Noah Heckman, Phishing

How to Not Get Scammed on Discord

Max Boehner & Noah Heckman // Introduction As 2020 sent us all into our homes social distancing, the demand for online messaging saw a huge spike in an effort for people to stay […]

Read the entire post here
00569_11022021_WebcastHowToShareYourKnowledge

Author, Fun & Games, How-To, Informational, Jason Blanchard, Webcasts

Webcast: How to Share Your Knowledge with Others

Have you ever seen a call for papers for a conference and thought to yourself that you’d like to submit a talk and then immediately thought, oh never mind? Have […]

Podcast: Play in new window | Download

Subscribe: Apple Podcasts | Spotify | Amazon Music | RSS

Read the entire post here
Hacking Unifi Controller Passwords for Fun and WIFI

Author, How-To, Informational, Kent Ickler Kent Ickler

Hacking Unifi Controller Passwords for Fun and WIFI

Kent Ickler // Because, you know—that should be a thing.  TL;DR:  Don’t run the Unifi Controller on a laptop in the closet.    BACKGROUND  Ubiquiti’s Unifi controller is a network device, or software […]

Read the entire post here

Author, How-To, Informational, InfoSec 101, Joff Thyer, Webcasts

Webcast: Shellcode Execution with GoLang

In this Black Hills Information Security (BHIS) webcast, we explore using GoLang to author malware with embedded shellcode. GoLang is a Google-authored modern successor language to C/C++. It is multi-platform, […]

Podcast: Play in new window | Download

Subscribe: Apple Podcasts | Spotify | Amazon Music | RSS

Read the entire post here

Author, Informational, InfoSec 101, Jordan Drysdale, Kent Ickler, Webcasts

Webcast: The Quest for the Kill Chain Killer Continues

Jordan and Kent have heard from a lot of people that the past Black Hills Information Security (BHIS) webcasts: “Group Policies That Kill Kill Chains” and “Active Directory Best Practices […]

Podcast: Play in new window | Download

Subscribe: Apple Podcasts | Spotify | Amazon Music | RSS

Read the entire post here
00559_09202021_WebcastGettingStartedBlockchain

Author, Beau Bullock, How-To, Informational, Webcasts

Webcast: Getting Started in Blockchain Security and Smart Contract Auditing

Why is blockchain security important? Blockchain usage has exploded since the Bitcoin whitepaper was first published in 2008. Many applications rely on this technology for increased trust and privacy, where […]

Podcast: Play in new window | Download

Subscribe: Apple Podcasts | Spotify | Amazon Music | RSS

Read the entire post here
00556_08252021_UnderstandingZigbee

Author, Hardware Hacking, How-To, Informational, Ray Felch, Wireless

Understanding Zigbee and Wireless Mesh Networking

Ray Felch // Preface: Recently, I acquired a few home automation devices, so that I might research Zigbee and get a better understanding of how this very popular wireless technology […]

Read the entire post here
00549_08122021_CenterforInternetSecurity

Author, Dale Hobbs, General InfoSec Tips & Tricks, Informational, InfoSec 101

Center for Internet Security (CIS) v8 – Why You Should Care

Dale Hobbs // The Center for Internet Security (CIS) Controls are a recommended set of highly effective defensive actions for cyber defense that provide specific and actionable methods to prevent the most dangerous and pervasive cyber-attacks. They were initially […]

Read the entire post here
«‹ 24 25 26 27›»

Looking For Something?

Browse by category

Recent Posts

  • smart goals_header (1)How to Set Smart Goals (That Actually Work For You)
    Setting goals is a deceptively simple career skill we
  • socinterview_headerInside the BHIS SOC: A Conversation with Hayden Covington 
    What happens when you ditch the tiered ticket queues
  • del3_headerAbusing Delegation with Impacket (Part 3): Resource-Based Constrained Delegation
    This is the third in a three-part series of blog posts

Browse by topic

Active Directory ADHD AI anti-virus Attack Tactics AV Beau Bullock BHIS Blue Team C2 Carrie Roberts cloud Cyber Deception hacking Hashcat infosec Infosec for Beginners InfoSec Survival Guide Joff Thyer john strand Jordan Drysdale Kent Ickler Kerberos Linux MailSniper Microsoft Nessus Nmap passwords password spraying pen-testing penetration testing pentest Pentesting phishing PowerShell Python Red Team red teaming RITA Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security, Inc.

890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008


About Us | BHIS Tribe of Companies | Privacy Policy | Contact

Links
Search the site