Black Hills Information Security, Inc.
RSS
  • All Services
    • Complete Service Guide
    • Active SOC
    • AI Security Assessments
    • Blockchain Security
    • Blue Team Services
    • Continuous Penetration Testing
    • High-Profile Risk Assessments
    • Incident Response
    • Penetration Testing
  • Contact Us
    • Contact Us
    • Email Sign-Up
  • About Us
    • Security Consultants
    • Admin
    • SOC Team
    • Antisyphon Training
    • BHIS Tribe of Companies
  • Free Resources
    • Blogs
    • Free Cybersecurity Tools
    • Free Cybersecurity Webcasts
    • Podcasts
    • RITA
  • Training
    • BHIS & Antisyphon Training
    • WWHF Conference
  • Community
    • Discord
    • LinkedIn
    • YouTube
    • Bluesky
    • Twitter/X
    • Upcoming Events
  • Fun Stuff
    • Backdoors & Breaches
    • Merch, Zines & More
    • PROMPT# Zine
    • REKCAH
    • Books
00569_11022021_WebcastHowToShareYourKnowledge

Author, Fun & Games, How-To, Informational, Jason Blanchard, Webcasts

Webcast: How to Share Your Knowledge with Others

Have you ever seen a call for papers for a conference and thought to yourself that you’d like to submit a talk and then immediately thought, oh never mind? Have […]

Podcast: Play in new window | Download

Subscribe: Apple Podcasts | Spotify | Amazon Music | RSS

Read the entire post here
Hacking Unifi Controller Passwords for Fun and WIFI

Author, How-To, Informational, Kent Ickler Kent Ickler

Hacking Unifi Controller Passwords for Fun and WIFI

Kent Ickler // Because, you know—that should be a thing.  TL;DR:  Don’t run the Unifi Controller on a laptop in the closet.    BACKGROUND  Ubiquiti’s Unifi controller is a network device, or software […]

Read the entire post here

Author, How-To, Informational, InfoSec 101, Joff Thyer, Webcasts

Webcast: Shellcode Execution with GoLang

In this Black Hills Information Security (BHIS) webcast, we explore using GoLang to author malware with embedded shellcode. GoLang is a Google-authored modern successor language to C/C++. It is multi-platform, […]

Podcast: Play in new window | Download

Subscribe: Apple Podcasts | Spotify | Amazon Music | RSS

Read the entire post here

Author, Informational, InfoSec 101, Jordan Drysdale, Kent Ickler, Webcasts

Webcast: The Quest for the Kill Chain Killer Continues

Jordan and Kent have heard from a lot of people that the past Black Hills Information Security (BHIS) webcasts: “Group Policies That Kill Kill Chains” and “Active Directory Best Practices […]

Podcast: Play in new window | Download

Subscribe: Apple Podcasts | Spotify | Amazon Music | RSS

Read the entire post here
00559_09202021_WebcastGettingStartedBlockchain

Author, Beau Bullock, How-To, Informational, Webcasts

Webcast: Getting Started in Blockchain Security and Smart Contract Auditing

Why is blockchain security important? Blockchain usage has exploded since the Bitcoin whitepaper was first published in 2008. Many applications rely on this technology for increased trust and privacy, where […]

Podcast: Play in new window | Download

Subscribe: Apple Podcasts | Spotify | Amazon Music | RSS

Read the entire post here
00556_08252021_UnderstandingZigbee

Author, Hardware Hacking, How-To, Informational, Ray Felch, Wireless

Understanding Zigbee and Wireless Mesh Networking

Ray Felch // Preface: Recently, I acquired a few home automation devices, so that I might research Zigbee and get a better understanding of how this very popular wireless technology […]

Read the entire post here
00549_08122021_CenterforInternetSecurity

Author, Dale Hobbs, General InfoSec Tips & Tricks, Informational, InfoSec 101

Center for Internet Security (CIS) v8 – Why You Should Care

Dale Hobbs // The Center for Internet Security (CIS) Controls are a recommended set of highly effective defensive actions for cyber defense that provide specific and actionable methods to prevent the most dangerous and pervasive cyber-attacks. They were initially […]

Read the entire post here
00551_08042021_AdminsNightmare

Author, Blue Team, How-To, Informational, InfoSec 101, Steve Borosh

Admin’s Nightmare: Combining HiveNightmare/SeriousSAM and AD CS Attack Path’s for Profit

Stephan Borosh // The year of 2021 has presented some interesting challenges to securing Windows and Active Directory environments with new flaws that Microsoft has been slow to address.   In June, @Harmj0y and @tifkin_ […]

Read the entire post here
00550_072822021_WhatToKnowAboutMicrosoftsRegistryHiveFlaw

General InfoSec Tips & Tricks, Informational, InfoSec 101

What To Know About Microsoft’s Registry Hive Flaw: #SeriousSAM

#hivenightmare / #lolwut Jeff McJunkin* // What is it? tl;dr — Unpatched privilege escalation in Windows 10 in nearly all supported builds. The vulnerability (CVE-2021–36934) allows an attacker with limited […]

Read the entire post here
«‹ 25 26 27 28›»

Looking For Something?

Browse by category

Recent Posts

  • homelab_headerWhat to Do with Your First Home Lab
    Having assembled fundamental lab components, you now
  • deadwood_headerWhen the SOC Goes to Deadwood: A Night to Remember 
    Hear a tale about the time the BHIS SOC team conducted
  • Social Engineering and Microsoft SSPRSocial Engineering and Microsoft SSPR: The Road to Pwnage is Paved with Good Intentions 
    This scenario simultaneously tests identity

Browse by topic

Active Directory ADHD AI anti-virus Attack Tactics AV Beau Bullock BHIS Blue Team C2 Carrie Roberts cloud Cyber Deception hacking Hashcat infosec Infosec for Beginners InfoSec Survival Guide Joff Thyer john strand Jordan Drysdale Kent Ickler Kerberos Linux MailSniper Microsoft Nessus Nmap passwords password spraying pen-testing penetration testing pentest Pentesting phishing PowerShell Python Red Team red teaming RITA Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security, Inc.

890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008


About Us | BHIS Tribe of Companies | Privacy Policy | Contact

Links
Search the site