Black Hills Information Security, Inc.
RSS
  • All Services
    • Complete Service Guide
    • Active SOC
    • AI Security Assessments
    • Blockchain Security
    • Blue Team Services
    • Continuous Penetration Testing
    • High-Profile Risk Assessments
    • Incident Response
    • Penetration Testing
  • Contact Us
    • Contact Us
    • Email Sign-Up
  • About Us
    • Security Consultants
    • Admin
    • SOC Team
    • Antisyphon Training
    • BHIS Tribe of Companies
  • Free Resources
    • Blogs
    • Free Cybersecurity Tools
    • Free Cybersecurity Webcasts
    • Podcasts
    • RITA
  • Training
    • BHIS & Antisyphon Training
    • WWHF Conference
  • Community
    • Discord
    • LinkedIn
    • YouTube
    • Bluesky
    • Twitter/X
    • Upcoming Events
  • Fun Stuff
    • Backdoors & Breaches
    • Merch, Zines & More
    • PROMPT# Zine
    • REKCAH
    • Books
YTPlayList_3

Author, How-To, Informational, InfoSec 101, John Strand john strand, RITA, Zeek

Detecting Malware Beacons With Zeek and RITA

Hello and welcome, my name is John Strand and in this video, we’re going to be talking a little bit about beaconing using RITA. Now, for this particular video, I’m […]

Read the entire post here
YTBH106_02252020_Wireshark

Author, How-To, Informational, InfoSec 101, John Strand john strand, Wireshark

Getting Started With Wireshark

Hello and welcome, my name is John Strand and in this video, we’re going to be getting started with Wireshark. Now, Wireshark is very similar to TCPDump, in fact, a […]

Read the entire post here
YTBH105_02182020_TCPDump

Author, How-To, Informational, InfoSec 101, John Strand john strand, TCPDump

Getting Started With TCPDump

Hello and welcome, my name is John Strand and in this video, we’re going to be talking about getting started with TCPDump.   Now, TCPDump is a fantastic tool, it’s one […]

Read the entire post here
00438_02182020_WebcastEnterpriseReconForPurpleTeams

Author, Blue Team, How-To, Informational, InfoSec 101, Jordan Drysdale, Kent Ickler, Red Team, Webcasts Jordan Drysdale, Kent Ickler, Purple Team

Webcast: Enterprise Recon For Purple Teams

Do you know what your attackers know? There’s a good chance you know, but you might not be aware of just how much information can be found historically and in […]

Podcast: Play in new window | Download

Subscribe: Apple Podcasts | Spotify | Amazon Music | RSS

Read the entire post here
00437_02122020_LinuxCommandLine

How-To, Informational, Webcasts Hal Pomeranz, Linux

Webcast: Linux Command Line Dojo with Hal Pomeranz

In this webcast, we have our friend Hal Pomeranz sharing his massive knowledge on Linux. If you’re new to Linux, or if you know it and just want to hear […]

Podcast: Play in new window | Download

Subscribe: Apple Podcasts | Spotify | Amazon Music | RSS

Read the entire post here
00436_02072020_WebcastCompetitiveB&B

Author, Fun & Games, How-To, Informational, John Strand, Webcasts Backdoors & Breaches, john strand

Webcast: Introducing Competitive Backdoors & Breaches and More!

Backdoors & Breaches kind of took off. In case you don’t know, Backdoors & Breaches is an Incident Response Card Game to help people better understand the various attacks and defenses used […]

Podcast: Play in new window | Download

Subscribe: Apple Podcasts | Spotify | Amazon Music | RSS

Read the entire post here
00435_02072020_WebcastGettingStartedCyberDeception

Author, How-To, Informational, InfoSec 101, John Strand, Webcasts Cyber Deception, john strand

Webcast: Getting Started in Cyber Deception

Ever wanted to get started in cyber deception? Ever wanted to do it for free? In this BHIS webcast, we will cover some basic, legal, and easy tools/techniques to get […]

Podcast: Play in new window | Download

Subscribe: Apple Podcasts | Spotify | Amazon Music | RSS

Read the entire post here
00434_01282020_MyFirstJoyrideWithSILENTTRINITY

Author, How-To, Informational, Jordan Drysdale, Red Team Jordan Drysdale, SILENTTRINITY

My First Joyride With SILENTTRINITY

TL;DR SILENTTRINITY (ST) made the news a few times in July 2019, and I wanted to see what all the fuss was about. This article has enough information to get […]

Read the entire post here
00433_01242020_RedTeamersCookbook-2

How-To, Informational, Red Team BYOI, Marcello Salvati, Red Team

Red Teamer’s Cookbook: BYOI (Bring Your Own Interpreter)

Marcello Salvati // This fairly lengthy blog post aims at providing Red Team Operators ideas on how to incorporate BYOI tradecraft into their own custom tooling and get those creative […]

Read the entire post here
«‹ 34 35 36 37›»

Looking For Something?

Browse by category

Recent Posts

  • homelab_headerWhat to Do with Your First Home Lab
    Having assembled fundamental lab components, you now
  • deadwood_headerWhen the SOC Goes to Deadwood: A Night to Remember 
    Hear a tale about the time the BHIS SOC team conducted
  • Social Engineering and Microsoft SSPRSocial Engineering and Microsoft SSPR: The Road to Pwnage is Paved with Good Intentions 
    This scenario simultaneously tests identity

Browse by topic

Active Directory ADHD AI anti-virus Attack Tactics AV Beau Bullock BHIS Blue Team C2 Carrie Roberts cloud Cyber Deception hacking Hashcat infosec Infosec for Beginners InfoSec Survival Guide Joff Thyer john strand Jordan Drysdale Kent Ickler Kerberos Linux MailSniper Microsoft Nessus Nmap passwords password spraying pen-testing penetration testing pentest Pentesting phishing PowerShell Python Red Team red teaming RITA Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security, Inc.

890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008


About Us | BHIS Tribe of Companies | Privacy Policy | Contact

Links
Search the site