Black Hills Information Security, Inc.
RSS
  • All Services
    • Complete Service Guide
    • Active SOC
    • AI Security Assessments
    • Blockchain Security
    • Blue Team Services
    • Continuous Penetration Testing
    • High-Profile Risk Assessments
    • Incident Response
    • Penetration Testing
  • Contact Us
    • Contact Us
    • Email Sign-Up
  • About Us
    • Security Consultants
    • Admin Team
    • Active SOC Team
    • Antisyphon Training
    • BHIS Tribe of Companies
  • Free Resources
    • Blogs
    • Free Cybersecurity Tools
    • Free Cybersecurity Webcasts
    • Podcasts
    • RITA
  • Training
    • BHIS & Antisyphon Training
    • WWHF Conference
  • Community
    • Discord
    • LinkedIn
    • YouTube
    • Bluesky
    • Twitter/X
    • Upcoming Events
  • Fun Stuff
    • Backdoors & Breaches
    • Merch, Zines & More
    • PROMPT# Zine
    • REKCAH
    • Books
00489_10262020_WebcastSOC

Author, How-To, Informational, John Strand, Webcasts

Webcast: The SOC Age Or, A Young SOC Analyst’s Illustrated Primer

Many people get started in security as a Security Operations Center (SOC) analyst. In this Black Hills Information Security (BHIS) webcast we discuss the core skills that a SOC analyst […]

Podcast: Play in new window | Download

Subscribe: Apple Podcasts | Spotify | Amazon Music | RSS

Read the entire post here
00487_10212020_HowToInstallMitreCALDERA

How-To, Informational

How to Install Mitre CALDERA and Configure Your SSL Certificate

Carrie & Darin Roberts // If you would like to install the Mitre CALDERA server on your own, the CALDERA GitHub page has installation instructions on their ReadMe here. Detailed […]

Read the entire post here
00486_10192020_Webcast_InfosecMentoring

Author, How-To, Informational, InfoSec 101, Jason Blanchard, Webcasts

Webcast: Infosec Mentoring | How to Find and Be a Mentor & Mentee

They say it “takes a village” to help raise a child… well, it also takes a village to help raise an infosec professional. With so many technologies, techniques, and tools […]

Podcast: Play in new window | Download

Subscribe: Apple Podcasts | Spotify | Amazon Music | RSS

Read the entire post here
Exploiting MFA Inconsistencies on Microsoft Services

Author, Beau Bullock, How-To, Informational

Exploiting MFA Inconsistencies on Microsoft Services

Beau Bullock // Overview On offensive engagements, such as penetration tests and red team assessments, I have been seeing inconsistencies in how MFA is applied to the various Microsoft services. […]

Read the entire post here
00484_09082020_WebcastWhenWorldscCollide

Informational, InfoSec 101, Webcasts

Webcast: When Worlds Collide: OSS Hunting & Adversarial Simulation

Worlds collide as Black Hills Information Security (BHIS) brings together legendary developers in open source software (OSS) hunting and adversarial emulation projects for a discussion on the current state of […]

Podcast: Play in new window | Download

Subscribe: Apple Podcasts | Spotify | Amazon Music | RSS

Read the entire post here
00483_09032020_Webcast_HowToPresent

Author, Fun & Games, Informational, InfoSec 101, John Strand, Webcasts john strand

Webcast: How to Present: Secrets of a Retired SANS Instructor

John Strand // Ok, that was a bit of a dramatic title. But, it works. In this Black Hills Information Security (BHIS) webcast, John covers the tips and tricks on […]

Podcast: Play in new window | Download

Subscribe: Apple Podcasts | Spotify | Amazon Music | RSS

Read the entire post here
00482_08262020_ReverseEngineeringSmartLock

Author, Fun & Games, Hardware Hacking, How-To, Informational, Ray Felch

Reverse Engineering a Smart Lock

Ray Felch // INTRODUCTION Recently I was afforded the opportunity to research the findings of a well-known security firm (F-Secure), who had discovered a vulnerability in the Guardtec KeyWe Smart […]

Read the entire post here
00481_08212020_WebcastPrettyLittlePython

How-To, Informational, Webcasts Marcello Salvati, Python

Webcast: Pretty Little Python Secrets – Episode 1 – Installing Python Tools and Libraries the Right Way

Have you ever installed a Python tool / library only to then find out other Python based tools you’ve installed previously are now completely broken? Running Kali? Ever try installing […]

Podcast: Play in new window | Download

Subscribe: Apple Podcasts | Spotify | Amazon Music | RSS

Read the entire post here
00479_08192020_HowSPF

Author, Fun & Games, How-To, Informational, InfoSec 101, Kent Ickler Kent Ickler

How SPF, DKIM, and DMARC Authentication Works to Increase Inbox Penetration (Testing) Rates

Kent Ickler // TL;DR Want a quick fix?  Almost every marketing platform we’ve seen has decent tutorials on authorizing outbound email with SPF and DKIM authorization. If you’re a marketing […]

Read the entire post here
«‹ 30 31 32 33›»

Looking For Something?

Browse by category

Recent Posts

  • Proxy execution via WebView2 bannerSigned, Trusted, and Abused: Proxy Execution via WebView2
    An offensive security perspective on Microsoft Edge
  • Getting Started in PentestingGetting Started In Pentesting – Advice From The BHIS Pentest Lead
    Advice about getting started in pentesting from the
  • Tips and Resources for Securing the CloudCloud Security: Tips and Resources for Securing the Cloud
    This overview of the basics of Cloud Security includes

Browse by topic

Active Directory ADHD AI anti-virus Attack Tactics AV Beau Bullock BHIS Blue Team C2 Carrie Roberts cloud Cyber Deception hacking infosec Infosec for Beginners InfoSec Survival Guide Joff Thyer john strand Jordan Drysdale Kent Ickler Kerberos Linux MailSniper Malware Microsoft Nessus Nmap passwords password spraying pen-testing penetration testing pentest Pentesting phishing PowerShell Python Red Team red teaming RITA Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security, Inc.

890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008


About Us | BHIS Tribe of Companies | Privacy Policy | Contact

Links
Search the site