Black Hills Information Security, Inc.
RSS
  • All Services
    • Complete Service Guide
    • Active SOC
    • AI Security Assessments
    • Blockchain Security
    • Blue Team Services
    • Continuous Penetration Testing
    • High-Profile Risk Assessments
    • Incident Response
    • Penetration Testing
  • Contact Us
    • Contact Us
    • Email Sign-Up
  • About Us
    • Security Consultants
    • Admin
    • SOC Team
    • Antisyphon Training
    • BHIS Tribe of Companies
  • Free Resources
    • Blogs
    • Free Cybersecurity Tools
    • Free Cybersecurity Webcasts
    • Podcasts
    • RITA
  • Training
    • BHIS & Antisyphon Training
    • WWHF Conference
  • Community
    • Discord
    • LinkedIn
    • YouTube
    • Bluesky
    • Twitter/X
    • Upcoming Events
  • Fun Stuff
    • Backdoors & Breaches
    • Merch, Zines & More
    • PROMPT# Zine
    • REKCAH
    • Books
waf_header

Guest Author, Informational defense, Pentesting, Pentetration Testing, WAF, web application firewalls

Bypassing WAFs Using Oversized Requests

Many web application firewalls (WAFs) can be bypassed by simply sending large amounts of extra data in the request body along with your payload. Most WAFs will only process requests up to a certain size limit. How the WAF is configured to handle these large requests determines exploitability, but some common WAFs will allow it by default.

Read the entire post here
aihackingpt2_header

Brian Fehrman, General InfoSec Tips & Tricks, Informational AI, Artificial Intelligence, Large Language Models, LLMs, Prompt Injection

Getting Started with AI Hacking Part 2: Prompt Injection

In Part 2, we’re diving headfirst into one of the most critical attack surfaces in the LLM ecosystem – Prompt Injection: The AI version of talking your way past the bouncer.

Read the entire post here
Win_logs_headerpt2

Blue Team Tools, How-To, Hunt Teaming, Incident Response, Informational, InfoSec 201 evtx, hayabusa, SOF-ELK

Wrangling Windows Event Logs with Hayabusa & SOF-ELK (Part 2)

But what if we need to wrangle Windows Event Logs for more than one system? In part 2, we’ll wrangle EVTX logs at scale by incorporating Hayabusa and SOF-ELK into my rapid endpoint investigation workflow (“REIW”)! 

Read the entire post here
domcat_header

How-To, Informational, InfoSec 201, Phishing, Recon, Red Team, Red Team Tools Domain Categorization, DomCat, Expired Domains, William Oldert

DomCat: A Domain Categorization Tool

DomCat is a command-line tool written in Golang that helps the user find expired domains with desirable categorizations.

Read the entire post here
Win_logs_header

Blue Team, How-To, Hunt Teaming, Incident Response, Informational, InfoSec 201 evtx, hayabusa, SOF-ELK

Wrangling Windows Event Logs with Hayabusa & SOF-ELK (Part 1)

In part 1 of this post, we’ll discuss how Hayabusa and “Security Operations and Forensics ELK” (SOF-ELK) can help us wrangle EVTX files (Windows Event Log files) for maximum effect during a Windows endpoint investigation!

Read the entire post here
msstore_header

Blue Team, David Fletcher, How-To, Informational Microsoft store, winget

Microsoft Store and WinGet: Security Risks for Corporate Environments

The Microsoft Store provides a convenient mechanism to install software without needing administrator permissions. The feature is convenient for non-corporate and home users but is unlikely to be acceptable in corporate environments. This is because attackers and malicious employees can use the Microsoft Store to install software that might violate organizational policy. 

Read the entire post here
default_web_header

Chris Sullo', General InfoSec Tips & Tricks, Informational, InfoSec 101, Web App

Default Web Content

Whether it’s forgotten temporary files, installation artifacts, READMEs, or even simple image files–default content on web servers can turn into a boon for attackers. In the most innocent of cases, these types of content can let attackers know more about the tech stack of the environment, and in the worst case scenario can lead to exploitation.

Read the entire post here
default_web_header (1)

Informational, Jack Hyland extension, Mailfail

MailFail

MailFail is a Firefox browser extension that identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdomain. The extension’s UI popup highlights any misconfigurations in red and links to the supporting documentation.

Read the entire post here
admin_utilities_header

Dale Hobbs, General InfoSec Tips & Tricks, Informational, InfoSec 101 CMD, PowerShell, RDP

Commonly Abused Administrative Utilities: A Hidden Risk to Enterprise Security 

Organizations tend to focus a significant amount of their efforts on external threats, such as phishing and ransomware, but they often overlook one of the most dangerous attack vectors on their internal networks. 

Read the entire post here
«‹ 2 3 4 5›»

Looking For Something?

Browse by category

Recent Posts

  • Linux Persistence For PentestersThe “P” in PAM is for Persistence: Linux Persistence Technique
    Learn about a pentesting tool using the Pluggable
  • malanalysis_headerMalware Analysis: How to Analyze and Understand Malware
    Malware analysis is an amazing field that can be
  • OSINT_headerOSINT: How to Find, Use, and Control Open-Source Intelligence
    OSINT stands for open-source intelligence, and it

Browse by topic

Active Directory ADHD AI anti-virus Attack Tactics AV Beau Bullock BHIS Blue Team C2 Carrie Roberts cloud Cyber Deception hacking infosec Infosec for Beginners InfoSec Survival Guide Joff Thyer john strand Jordan Drysdale Kent Ickler Kerberos Linux MailSniper Malware Microsoft Nessus Nmap passwords password spraying pen-testing penetration testing pentest Pentesting phishing PowerShell Python Red Team red teaming RITA Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security, Inc.

890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008


About Us | BHIS Tribe of Companies | Privacy Policy | Contact

Links
Search the site