Black Hills Information Security, Inc.
RSS
  • All Services
    • Complete Service Guide
    • Active SOC
    • AI Security Assessments
    • Blockchain Security
    • Blue Team Services
    • Continuous Penetration Testing
    • High-Profile Risk Assessments
    • Incident Response
    • Penetration Testing
  • Contact Us
    • Contact Us
    • Email Sign-Up
  • About Us
    • Security Consultants
    • Admin
    • SOC Team
    • Antisyphon Training
    • BHIS Family of Companies
  • Free Resources
    • Blogs
    • Free Cybersecurity Tools
    • Free Cybersecurity Webcasts
    • Podcasts
    • RITA
  • Training
    • BHIS & Antisyphon Training
    • WWHF Conference
  • Online Community
    • Discord
    • LinkedIn
    • YouTube
    • Bluesky
    • Twitter/X
    • Upcoming Events
  • Fun Stuff
    • OLD
    • Merch, Zines & More
    • PROMPT# Zine
    • REKCAH
    • Books
00494_11232020_AzureSecurityBasics

Author, General InfoSec Tips & Tricks, How-To, Informational, InfoSec 101, Jordan Drysdale Jordan Drysdale

Azure Security Basics: Log Analytics, Security Center, and Sentinel

Jordan Drysdale // TL;DR The problem with a pentester’s perspective on defense, hunting, and security: Lab demographics versus scale.  If it costs $15 bucks per month per server for me […]

Read the entire post here
00488_10262020_MachinIntheMiddle

Author, General InfoSec Tips & Tricks, Hardware Hacking, How-To, Informational, InfoSec 101, Ray Felch

Machine-in-the-Middle (MitM) BLE Attack

Ray Felch // Introduction Continuing with my ongoing Smart Lock attack research (see blog Reverse Engineering a Smart Lock), I decided to move my focus to a different type of […]

Read the entire post here
00489_10262020_WebcastSOC

Author, How-To, Informational, John Strand, Webcasts

Webcast: The SOC Age Or, A Young SOC Analyst’s Illustrated Primer

Many people get started in security as a Security Operations Center (SOC) analyst. In this Black Hills Information Security (BHIS) webcast we discuss the core skills that a SOC analyst […]

Podcast: Play in new window | Download

Subscribe: Apple Podcasts | Spotify | Amazon Music | RSS

Read the entire post here
00487_10212020_HowToInstallMitreCALDERA

How-To, Informational

How to Install Mitre CALDERA and Configure Your SSL Certificate

Carrie & Darin Roberts // If you would like to install the Mitre CALDERA server on your own, the CALDERA GitHub page has installation instructions on their ReadMe here. Detailed […]

Read the entire post here
00486_10192020_Webcast_InfosecMentoring

Author, How-To, Informational, InfoSec 101, Jason Blanchard, Webcasts

Webcast: Infosec Mentoring | How to Find and Be a Mentor & Mentee

They say it ā€œtakes a villageā€ to help raise a child… well, it also takes a village to help raise an infosec professional. With so many technologies, techniques, and tools […]

Podcast: Play in new window | Download

Subscribe: Apple Podcasts | Spotify | Amazon Music | RSS

Read the entire post here
Exploiting MFA Inconsistencies on Microsoft Services

Author, Beau Bullock, How-To, Informational

Exploiting MFA Inconsistencies on Microsoft Services

Beau Bullock // Overview On offensive engagements, such as penetration tests and red team assessments, I have been seeing inconsistencies in how MFA is applied to the various Microsoft services. […]

Read the entire post here
00484_09082020_WebcastWhenWorldscCollide

Informational, InfoSec 101, Webcasts

Webcast: When Worlds Collide: OSS Hunting & Adversarial Simulation

Worlds collide as Black Hills Information Security (BHIS) brings together legendary developers in open source software (OSS) hunting and adversarial emulation projects for a discussion on the current state of […]

Podcast: Play in new window | Download

Subscribe: Apple Podcasts | Spotify | Amazon Music | RSS

Read the entire post here
00483_09032020_Webcast_HowToPresent

Author, Fun & Games, Informational, InfoSec 101, John Strand, Webcasts john strand

Webcast: How to Present: Secrets of a Retired SANS Instructor

John Strand // Ok, that was a bit of a dramatic title. But, it works. In this Black Hills Information Security (BHIS) webcast, John covers the tips and tricks on […]

Podcast: Play in new window | Download

Subscribe: Apple Podcasts | Spotify | Amazon Music | RSS

Read the entire post here
00482_08262020_ReverseEngineeringSmartLock

Author, Fun & Games, Hardware Hacking, How-To, Informational, Ray Felch

Reverse Engineering a Smart Lock

Ray Felch // INTRODUCTION Recently I was afforded the opportunity to research the findings of a well-known security firm (F-Secure), who had discovered a vulnerability in the Guardtec KeyWe Smart […]

Read the entire post here
«‹ 28 29 30 31›»

Looking For Something?

Browse by category

Recent Posts

  • smart goals_header (1)How to Set Smart Goals (That Actually Work For You)
    Setting goals is a deceptively simple career skill we
  • socinterview_headerInside the BHIS SOC: A Conversation with Hayden CovingtonĀ 
    What happens when you ditch the tiered ticket queues
  • del3_headerAbusing Delegation with Impacket (Part 3): Resource-Based Constrained Delegation
    This is the third in a three-part series of blog posts

Browse by topic

Active Directory ADHD AI anti-virus Attack Tactics AV Beau Bullock BHIS Blue Team C2 Carrie Roberts cloud Cyber Deception hacking Hashcat infosec Infosec for Beginners InfoSec Survival Guide Joff Thyer john strand Jordan Drysdale Kent Ickler Kerberos Linux MailSniper Microsoft Nessus Nmap passwords password spraying pen-testing penetration testing pentest Pentesting phishing PowerShell Python Red Team red teaming RITA Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security, Inc.

890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008


About Us | BHIS Tribe of Companies | Privacy Policy | Contact

Links
Search the site