Black Hills Information Security, Inc.
RSS
  • All Services
    • Complete Service Guide
    • Active SOC
    • AI Security Assessments
    • Blockchain Security
    • Blue Team Services
    • Continuous Penetration Testing
    • High-Profile Risk Assessments
    • Incident Response
    • Penetration Testing
  • Contact Us
    • Contact Us
    • Email Sign-Up
  • About Us
    • Security Consultants
    • Admin
    • SOC Team
    • Antisyphon Training
    • BHIS Family of Companies
  • Free Resources
    • Blogs
    • Free Cybersecurity Tools
    • Free Cybersecurity Webcasts
    • Podcasts
    • RITA
  • Training
    • BHIS & Antisyphon Training
    • WWHF Conference
  • Online Community
    • Discord
    • LinkedIn
    • YouTube
    • Bluesky
    • Twitter/X
    • Upcoming Events
  • Fun Stuff
    • Backdoors & Breaches
    • Merch, Zines & More
    • PROMPT# Zine
    • REKCAH
    • Books
00413_10162019_WEBCAST_HowToPlayB&B

Author, How-To, Informational, John Strand, Webcasts Backdoors & Breaches, john strand

Webcast: How to Play Backdoors & Breaches, Incident Response Card Game

Slides for this webcast can be found here: https://www.blackhillsinfosec.com/wp-content/uploads/2020/09/SLIDES_HowToPlayBackdoorsBreaches.pdf More info: https://www.blackhillsinfosec.com/projects/backdoorsandbreaches/ 2:09 Introduction to the types of cards in the deck, pricing, why we created B&B 10:25 Basic setup […]

Read the entire post here
00412_10212019_WEBCAST_HowToPrepareBeforeTheCompromise

Author, Informational, John Strand, Webcasts Backdoors & Breaches, Firewall Logs, john strand, RITA, Server Analysis, SIEM, UBEA, Zeek

Webcast: How to Prepare Before the Compromise

Click on the timecodes to jump to that part of the video (on YouTube) Slides for this webcast can be found here: https://www.blackhillsinfosec.com/wp-content/uploads/2020/09/SLIDES_HowtoPrepareBeforeCompromise.pdf 00:40 Intro, background information, how to deal with […]

Read the entire post here
00411_10152019_CrackingPasswordsUmlauts

How-To, Informational Carrie Roberts, DPAT, Hashcat, NTLM, Password cracking, Umlauts

Cracking Passwords with Umlauts

Carrie Roberts // *Guest Blog You have a password hash you would like to crack for a password that contains an Umlaut. You know, the two dots over a letter […]

Read the entire post here
00410_10102019_WEBCAST_SILENTTRINITY

Author, Informational, John Strand, Marcello Salvati, Red Team, Red Team Tools, Webcasts BYOI, john strand, Marcello Salvati, SILENTTRINITY

Webcast: In-Depth SILENTTRINITY Demo, Explanation & Walkthrough

Click on the timecodes to jump to that part of the video (on YouTube) Slides for this webcast can be found here: https://www.blackhillsinfosec.com/wp-content/uploads/2020/09/SLIDES_SILENTTRINITYIndepthDemo.pdf 1:07 Quick review of SILENTTRINITY functions, an overview […]

Read the entire post here
00409_10072019_WEBCAST_CloudTradeCraft

Author, Informational, John Strand, Jordan Drysdale, Webcasts cloud tradecraft, EyeWitness, GoWitness, Hadoop, john strand, Jordan Drysdale, MapReduce, Open-Source, Webshot

Webcast: Open Source Exploits in the Cloud’s Big Data Services – Cloud TradeCraft

Click on the timecodes to jump to that part of the video (on YouTube) Slides for this webcast can be found here: https://www.blackhillsinfosec.com/wp-content/uploads/2020/09/SLIDES_OpenSourceExploitsinCloudsBigDataServices.pdf 4:18 Problem statement and exploitation timeline8:28 MapReduce and […]

Read the entire post here
00408_10022019_DNSServerUsedForDDoSAttacks

Author, Blue Team, Informational, InfoSec 101, Melissa Bruno BIND, DDoS, DNS, DNS cache snooping, Mail Relay Servers, Melissa Bruno

Do You Know If Your DNS Server Can Be Used For DDoS Attacks?

Melissa Bruno // So you have an Internet-facing DNS server. Maybe you decided to set one up at home for fun, or your company has one that works with other […]

Read the entire post here
00407_09252019_GettingStartedWithAppLocker (2)

Author, General InfoSec Tips & Tricks, How-To, Informational, InfoSec 101, John Strand ADHD, applocker, john strand, whitelisting

Getting Started With AppLocker

John Strand // I have quite a few calls with customers who do not know where to begin when it comes to application whitelisting. Often, the approach some organizations take […]

Read the entire post here
00405_09182019_FixingEyeWitnessErrors

How-To, Informational Darin Roberts, EyeWitness, Kali Linux

Fixing EyeWitness Install Errors on Kali Linux

Darin Roberts // I recently had to install a new gold image as my Kali Linux testing virtual machine.  Almost on every test I do, I clone the gold image […]

Read the entire post here
BLOG_chalkboard2_00406

Author, General InfoSec Tips & Tricks, How-To, Informational, InfoSec 101, John Strand ADHD, john strand, Logging, Malware, Sysmon

Getting Started With Sysmon

John Strand // In this blog, I want to walk through how we can set up Sysmon to easily get improved logging over what we get from normal (and just […]

Read the entire post here
«‹ 36 37 38 39›»

Looking For Something?

Browse by category

Recent Posts

  • smart goals_header (1)How to Set Smart Goals (That Actually Work For You)
    Setting goals is a deceptively simple career skill we
  • socinterview_headerInside the BHIS SOC: A Conversation with Hayden CovingtonĀ 
    What happens when you ditch the tiered ticket queues
  • del3_headerAbusing Delegation with Impacket (Part 3): Resource-Based Constrained Delegation
    This is the third in a three-part series of blog posts

Browse by topic

Active Directory ADHD AI anti-virus Attack Tactics AV Beau Bullock BHIS Blue Team C2 Carrie Roberts cloud Cyber Deception hacking Hashcat infosec Infosec for Beginners InfoSec Survival Guide Joff Thyer john strand Jordan Drysdale Kent Ickler Kerberos Linux MailSniper Microsoft Nessus Nmap passwords password spraying pen-testing penetration testing pentest Pentesting phishing PowerShell Python Red Team red teaming RITA Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security, Inc.

890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008


About Us | BHIS Tribe of Companies | Privacy Policy | Contact

Links
Search the site