Black Hills Information Security, Inc.
RSS
  • All Services
    • Complete Service Guide
    • Active SOC
    • AI Security Assessments
    • Blockchain Security
    • Blue Team Services
    • Continuous Penetration Testing
    • High-Profile Risk Assessments
    • Incident Response
    • Penetration Testing
  • Contact Us
    • Contact Us
    • Email Sign-Up
  • About Us
    • Security Consultants
    • Admin
    • SOC Team
    • Antisyphon Training
    • BHIS Family of Companies
  • Free Resources
    • Blogs
    • Free Cybersecurity Tools
    • Free Cybersecurity Webcasts
    • Podcasts
    • RITA
  • Training
    • BHIS & Antisyphon Training
    • WWHF Conference
  • Online Community
    • Discord
    • LinkedIn
    • YouTube
    • Bluesky
    • Twitter/X
    • Upcoming Events
  • Fun Stuff
    • Backdoors & Breaches
    • Merch, Zines & More
    • PROMPT# Zine
    • REKCAH
    • Books
00536_05192021_WebcastOpenSourceEDR

Author, Blue Team, Informational, John Strand, Webcasts

Webcast: Your Free and Open Source EDR Options!

There has been a huge explosion of different free and open-source options for EDR in the security space. Which is nice because the commercial offerings are stupid expensive. In this […]

Podcast: Play in new window | Download

Subscribe: Apple Podcasts | Spotify | Amazon Music | RSS

Read the entire post here
00532_05042021_UsingSDRBuildTrunkTracker

Author, Fun & Games, Hardware Hacking, How-To, Informational, Ray Felch

Using SDR to Build a Trunk Tracker – Police, Fire, and EMS Scanner

Ray Felch // Introduction  Recently, I came across an interesting article on using software-defined radio (SDR) to create a Police, Fire, EMS, and Public Safety systems scanner. Viewing a few of these Trunk […]

Read the entire post here
00535_05122021_LetsTalkAboutRansomware

Author, Blue Team, Blue Team Tools, Informational, John Strand, Webcasts

Webcast: Ok, Let’s Talk About Ransomware

This is a joint emergency webcast from the teams of Black Hills Information Security, Wild West Hackin’ Fest, and Active Countermeasures, presented by John Strand. There have been a couple […]

Podcast: Play in new window | Download

Subscribe: Apple Podcasts | Spotify | Amazon Music | RSS

Read the entire post here
00531_05042021_WebAppPenTesting

Author, General InfoSec Tips & Tricks, How-To, Informational, InfoSec 101, Joff Thyer, Web App Joff Thyer

Web App Pen Testing in an Angular Context

Joff Thyer // If you are a fan of web application pen testing, you have been spoiled with a lot of easy pickings over the years.  We all love our […]

Read the entire post here
00529_04302021_InformationFromThinAir

Author, Fun & Games, Hardware Hacking, How-To, Informational, Ray Felch

Information From Thin Air: Using SDR to Extract DTMF from Radio Waves

Ray Felch // Disclaimer  When using an FM transmitter, do not modify the intended operation of the module by amplifying the transmitted signal. Also, be sure that attaching an FM high gain […]

Read the entire post here
00526_04142021_FindingBuriedTreasureSMB

Author, David Fletcher, Informational

Finding Buried Treasure in Server Message Block (SMB)

David Fletcher // Service Message Block (SMB) shares can represent a significant risk to an organization. Companies often lack a realistic understanding of the exposure that SMB shares represent. Effective management typically requires a sound information management […]

Read the entire post here
00523_03292021_UsingHardwareForHardwareControl

Author, Fun & Games, Hardware Hacking, How-To, Informational, Ray Felch

Using Infrared for Hardware Control

Ray Felch // Overview  Infrared technology has been around for a very long time and is a wireless technology used in devices that convey data by way of Infrared radiation. […]

Read the entire post here
00520_WebcastOPSEC

Author, Informational, InfoSec 101, Michael Allen, Red Team, Red Team Tools, Webcasts

Webcast: OPSEC Fundamentals for Remote Red Teams

During remote red team exercises, it can be difficult to keep from leaking information to the target organization’s security team. Every interaction with the target’s website, every email sent, and […]

Podcast: Play in new window | Download

Subscribe: Apple Podcasts | Spotify | Amazon Music | RSS

Read the entire post here
00518_03152021_BackdoorsBreachesTTS

Backdoors & Breaches, Fun & Games, How-To, Informational

Backdoors & Breaches – Tabletop Simulator Guide

Edward Miro // Backdoors & Breaches is now available as an official Workshop Mod for Tabletop Simulator! Backdoors & Breaches (B&B) contains 52+ unique cards to help you conduct incident […]

Read the entire post here
«‹ 26 27 28 29›»

Looking For Something?

Browse by category

Recent Posts

  • smart goals_header (1)How to Set Smart Goals (That Actually Work For You)
    Setting goals is a deceptively simple career skill we
  • socinterview_headerInside the BHIS SOC: A Conversation with Hayden CovingtonĀ 
    What happens when you ditch the tiered ticket queues
  • del3_headerAbusing Delegation with Impacket (Part 3): Resource-Based Constrained Delegation
    This is the third in a three-part series of blog posts

Browse by topic

Active Directory ADHD AI anti-virus Attack Tactics AV Beau Bullock BHIS Blue Team C2 Carrie Roberts cloud Cyber Deception hacking Hashcat infosec Infosec for Beginners InfoSec Survival Guide Joff Thyer john strand Jordan Drysdale Kent Ickler Kerberos Linux MailSniper Microsoft Nessus Nmap passwords password spraying pen-testing penetration testing pentest Pentesting phishing PowerShell Python Red Team red teaming RITA Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security, Inc.

890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008


About Us | BHIS Tribe of Companies | Privacy Policy | Contact

Links
Search the site