Black Hills Information Security, Inc.
RSS
  • All Services
    • Complete Service Guide
    • Active SOC
    • AI Security Assessments
    • Blockchain Security
    • Blue Team Services
    • Continuous Penetration Testing
    • High-Profile Risk Assessments
    • Incident Response
    • Penetration Testing
  • Contact Us
    • Contact Us
    • Email Sign-Up
  • About Us
    • Security Consultants
    • Admin Team
    • Active SOC Team
    • Antisyphon Training
    • BHIS Tribe of Companies
  • Free Resources
    • Blogs
    • Free Cybersecurity Tools
    • Free Cybersecurity Webcasts
    • Podcasts
    • RITA
  • Training
    • BHIS & Antisyphon Training
    • WWHF Conference
  • Community
    • Discord
    • LinkedIn
    • YouTube
    • Bluesky
    • Twitter/X
    • Upcoming Events
  • Fun Stuff
    • Backdoors & Breaches
    • Merch, Zines & More
    • PROMPT# Zine
    • REKCAH
    • Books
00450_030202020_BasicGoogleSearches

Author, How-To, Informational, InfoSec 101, John Strand Google

Getting Started With Basic Google Searches

Hello and welcome. My name is John Strand and in this video, we’re going to be talking about some very basic Google searches. Now we’ve got to take a couple […]

Read the entire post here
00449_030202020_Base64

Author, How-To, Informational, John Strand Base64

Getting Started With Base64 Encoding and Decoding

Hello and welcome. My name is John Strand and in this video, we’re going to be talking about Base64 encoding and decoding. Now the reason why we’re talking about it […]

Read the entire post here
00458_04242020_WebcastBuildHomeLab

How-To, Informational, InfoSec 101, Webcasts Bill Stearns, john strand

Webcast: How to Build a Home Lab

This is a joint webcast from Black Hills Information Security and Active Countermeasures. How many of us have tried some new configuration option, utility, or hardware on a production environment, […]

Podcast: Play in new window | Download

Subscribe: Apple Podcasts | Spotify | Amazon Music | RSS

Read the entire post here
00448_03202020_ROTObfuscation

Author, How-To, Informational, InfoSec 101, John Strand, Red Team john strand

Getting Started With ROT Obfuscation

Hello, my name is John Strand. In this video, we’re going to be talking about ROT or rotate. Why exactly are we talking about one specific thing? Well, this particular […]

Read the entire post here
00447_03202020_Honeybadger

Author, How-To, Informational, InfoSec 101, John Strand, Red Team, Red Team Tools HoneyBadger

Getting Started With Tracking Hackers With HoneyBadger

Hello and welcome. My name is John Strand, and in this video, we’re going to talk a little bit about HoneyBadger. Now, in a number of other videos and a […]

Read the entire post here
00457_04152020_HomeNetworkDesignPart2

Author, Ethan Robish, How-To, Informational, InfoSec 101 ethan robish, home network

Home Network Design – Part 2

Ethan Robish // Why Segment Your Network? Here’s a quick recap from Part 1. A typical home network is flat. This means that all devices are connected to the same […]

Read the entire post here
00446_03202020_WordWebBugs

Author, Fun & Games, How-To, Informational, InfoSec 101, John Strand Cyber Deception, Word Web Bugs

Tracking Attackers With Word Web Bugs (Cyber Deception)

Hello and welcome! My name is John Strand, and in this video, we’re going to be talking about Word Web Bug Servers. Now the idea of a Word Web Bug […]

Read the entire post here
00445_03202020_HowToUsePortspoof

Author, Fun & Games, How-To, Informational, InfoSec 101, John Strand

How To Use Portspoof (Cyber Deception)

Hello and welcome, and in this video, we’re going to be talking a little bit about Portspoof, a fantastic utility that takes your unused TCP/IP ports and turns them into […]

Read the entire post here
00456_04032020_LogonScripts

Author, David Fletcher, Fun & Games, Informational, InfoSec 101, Red Team Backdoors & Breaches, David Fletcher

Backdoors & Breaches: Logon Scripts

David Fletcher // This blog post discusses the relevance and techniques involved in logon script abuse. While the Backdoors & Breaches card is featured for this topic, the post will […]

Read the entire post here
«‹ 33 34 35 36›»

Looking For Something?

Browse by category

Recent Posts

  • Getting Started in PentestingGetting Started In Pentesting – Advice From The BHIS Pentest Lead
    Advice about getting started in pentesting from the
  • Tips and Resources for Securing the CloudCloud Security: Tips and Resources for Securing the Cloud
    This overview of the basics of Cloud Security includes
  • Lessons from a chatbot incidentLessons From A Chatbot Incident
    Real-world account of how insecure databases and an AI

Browse by topic

Active Directory ADHD AI anti-virus Attack Tactics AV Beau Bullock BHIS Blue Team C2 Carrie Roberts cloud Cyber Deception hacking infosec Infosec for Beginners InfoSec Survival Guide Joff Thyer john strand Jordan Drysdale Kent Ickler Kerberos Linux MailSniper Malware Microsoft Nessus Nmap passwords password spraying pen-testing penetration testing pentest Pentesting phishing PowerShell Python Red Team red teaming RITA Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security, Inc.

890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008


About Us | BHIS Tribe of Companies | Privacy Policy | Contact

Links
Search the site