Black Hills Information Security
RSS
  • About Us
    • Security Analysts
    • Admin
    • SOC/HTOC Team
    • Partners
    • Interns
    • BHIS Tribe of Companies
  • Contact
    • Contact Us
    • Email Sign-Up
  • Services
    • Active SOC
    • ANTISOC
    • Blockchain Security
    • Blue Team Services
    • High-Profile Risk Assessments
    • Hunt Teaming (HTOC)
    • Incident Response
    • Penetration Testing
  • Projects/Tools
    • All Tools
    • RITA
    • Books
    • REKCAH
  • Learn
    • Backdoors & Breaches
    • Blog
    • Conference
    • Podcasts
    • PROMPT# Zine
    • Upcoming Events
    • Webcasts
  • Community
    • Discord
    • LinkedIn
    • T-Shirts & Hoodies
    • Twitter
    • YouTube
  • Training
00629_ 05242023_SixTipsForManagingPenetrationTestData

General InfoSec Tips & Tricks, How-To, Informational, InfoSec 101, John Malone Archive, data, testing

Six Tips for Managing Penetration Test Data

John Malone // Introduction Information is power. This sentiment also holds true when discussing the creation of a supporting archive. A supporting archive is something that we put together to […]

Read the entire post here

00628_05162023_DynamicDeviceCodePhishing

Blue Team, Incident Response, Informational, InfoSec 301, Phishing, Red Team, Social Engineering, Steve Borosh Device Code, Microsoft

Dynamic Device Code Phishing 

rvrsh3ll //  Introduction  This blog post is intended to give a light overview of device codes, access tokens, and refresh tokens. Here, I focus on the technical how-to for standing […]

Read the entire post here

BLOG_chalkboard_00627

Informational, Linux, moth Auditd, C, evasion

Auditd Field Spoofing: Now You Auditd Me, Now You Auditdon’t

moth // Introduction  One fateful night in June of 2022, Ethan sent a message to the crew: “Anyone know ways to fool Auditd on Linux? I’m trying to figure out how to change the auid (audit […]

Read the entire post here

BLOG_chalkboard_00625

Informational, Joseph Kingstone, Physical, Red Team

If You Don’t Ruse, You Lose: A Simple Guide to Blending in While Breaking In 

Joseph Kingstone // Are you assigned a physical penetration test and want to fly under the radar and meet all of your objectives like the elite hacker you are? Stick around […]

Read the entire post here

BLOG_chalkboard_00624

General InfoSec Tips & Tricks, Informational, Serena DiPenti Pentesting

Shenetworks Recommends: 9 Must Watch BHIS YouTube Videos

shenetworks // The Black Hills Information Security YouTube channel has over 400 videos available. Over the past year, I have attended many webcasts and explored plenty of the videos. I […]

Read the entire post here

MicrosoftTeams-image (17)

Informational

Genymotion – Proxying Android App Traffic Through Burp Suite | Cameron Cartier

Mobile App Testing is a category showing no signs of slowing down. In this video, BHIS tester Cameron Cartier walks us through linking Genymotion to Burp Suite for traffic monitoring. […]

Read the entire post here

BLOG_chalkboard_00623

Cameron Cartier, Informational, InfoSec 101, Mobile Android, android hacking, Android Security, Application Security, hacking, reverse engineering, security

Field Guide to the Android Manifest File

[email protected]

Read the entire post here

Got Enough Monitors

Carrie Roberts, General InfoSec Tips & Tricks, Informational

Got Enough Monitors?

Carrie Roberts // Guest Blog OK, I admit it: I might have a problem. But seriously, can you ever really have enough screen space? In this blog post, I’ll describe […]

Read the entire post here

BLOG_chalkboard_00621

Blue Team, C2, Derek Banks, Hunt Teaming, Incident Response, Informational

Ssh… Don’t Tell Them I Am Not HTTPS: How Attackers Use SSH.exe as a Backdoor Into Your Network

Derek Banks // Living Off the Land Binaries, Scripts, and Libraries, known as LOLBins or LOLBAS, are legitimate components of an operating system that threat actors can use to achieve […]

Read the entire post here

«‹ 2 3 4 5›»

Follow Us

Looking For Something?

Browse by category

Recent Posts

  • BLOG_chalkboard_00647The Simplest and Last Internet-Only ACL You’ll Ever Need 
    tl;dr  Implement this ACL using whatever network
  • Talkin’ About Infosec News – 11/30/2023
  • Talkin’ About Infosec News – 11/22/2023

Browse by topic

Active Directory ADHD anti-virus Attack Tactics AV Beau Bullock Blue Team bypassing AV C2 Carrie Roberts cloud command and control hacking hardware hacking infosec Joff Thyer john strand Jordan Drysdale Kent Ickler Linux MailSniper Malware Microsoft Nessus password policy passwords password spraying pen-testing penetration testing pentest Pentesting phishing podcast PowerShell Python Raymond Felch Red Team red teaming RITA social engineering Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security

890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008-2023


About Us | BHIS Tribe of Companies | Privacy Policy | Contact

Links
Search the site