Black Hills Information Security, Inc.
RSS
  • All Services
    • Complete Service Guide
    • Active SOC
    • AI Security Assessments
    • Blockchain Security
    • Blue Team Services
    • Continuous Penetration Testing
    • High-Profile Risk Assessments
    • Incident Response
    • Penetration Testing
  • Contact Us
    • Contact Us
    • Email Sign-Up
  • About Us
    • Security Consultants
    • Admin
    • SOC Team
    • Antisyphon Training
    • BHIS Tribe of Companies
  • Free Resources
    • Blogs
    • Free Cybersecurity Tools
    • Free Cybersecurity Webcasts
    • Podcasts
    • RITA
  • Training
    • BHIS & Antisyphon Training
    • WWHF Conference
  • Community
    • Discord
    • LinkedIn
    • YouTube
    • Bluesky
    • Twitter/X
    • Upcoming Events
  • Fun Stuff
    • Backdoors & Breaches
    • Merch, Zines & More
    • PROMPT# Zine
    • REKCAH
    • Books
00419_11262019_WEBCAST_GroupPoliciesKillKillChains

Author, Blue Team, Informational, Jordan Drysdale, Kent Ickler, Webcasts Best Practices, CMD, Group Policies, honey accounts, Jordan Drysdale, Kent Ickler, Kerberos, LAPS, LLMNR, Local Admin Controls, Logging, PowerShell, SMB Message Signing, Sysmon

Webcast: Group Policies That Kill Kill Chains

On this webcast, we’ll guide you through an iterative process of building and deploying effective and practical Group Policy Objects (GPOs) that increase security posture. Slides for this webcast can […]

Read the entire post here
00418_11132019_WhatsChangedReconng

Author, Brian King, How-To, Informational, Recon Brian King, Recon-ng

What’s Changed in Recon-ng 5.x

Brian King // Recon-ng had a major update in June 2019, from 4.9.6 to 5.0.0. This post is meant to help with the adjustment by providing a cheat sheet for […]

Read the entire post here
00417_11062019_RainyDay

Blue Team, Blue Team Tools, How-To, Informational, Red Team, Red Team Tools Certutil, Clip, Clipboard, Cmdkey, Curl, Microsoft, Net1, Sally Vandeven, Tar, Where, Whoami, Windows, Windows Command, Wslconfig

Rainy Day Windows Command Research Results

Sally Vandeven // We have all heard people talk about how much cooler Linux is than Windows, so much easier to use, etc. Well, they are not necessarily wrong… but we […]

Read the entire post here
00415_11042019_GSMTrafficEncryption

Author, Hardware Hacking, How-To, Informational, Ray Felch A5/1 Stream Cipher, GSM, Raymond Felch

GSM Traffic and Encryption: A5/1 Stream Cipher

Ray Felch // Disclaimer: Be sure to use a faraday bag or cage before transmitting cellular data so you don’t accidentally break any laws by illegally transmitting on regulated frequencies. Additionally, […]

Read the entire post here
00416_11012019_IntroToCCAT

How-To, Informational CCAT, Cisco Config Analysis Tool, kayla mackiewicz

How to Use CCAT: An Analysis Tool for Cisco Configuration Files

Kayla Mackiewicz // Last year, fellow tester Jordan Drysdale wrote a blog post about Cisco’s Smart Install feature. His blog post can be found here. If this feature is enabled […]

Read the entire post here
00414_10292019_IntroSoftwareDefinedRadio

Author, Hardware Hacking, How-To, Informational, InfoSec 101, Ray Felch GNURadio, GSM/LTE, Hackrf, Raymond Felch, RTL-SDR, SDR, Software Defined Radio, Wireshark

Intro to Software Defined Radio and GSM/LTE

Ray Felch // Disclaimer: Be sure to use a faraday bag or cage before transmitting cellular data so you don’t accidentally break any laws by illegally transmitting on regulated frequencies. […]

Read the entire post here
00413_10162019_WEBCAST_HowToPlayB&B

Author, How-To, Informational, John Strand, Webcasts Backdoors & Breaches, john strand

Webcast: How to Play Backdoors & Breaches, Incident Response Card Game

Slides for this webcast can be found here: https://www.blackhillsinfosec.com/wp-content/uploads/2020/09/SLIDES_HowToPlayBackdoorsBreaches.pdf More info: https://www.blackhillsinfosec.com/projects/backdoorsandbreaches/ 2:09 Introduction to the types of cards in the deck, pricing, why we created B&B 10:25 Basic setup […]

Read the entire post here
00412_10212019_WEBCAST_HowToPrepareBeforeTheCompromise

Author, Informational, John Strand, Webcasts Backdoors & Breaches, Firewall Logs, john strand, RITA, Server Analysis, SIEM, UBEA, Zeek

Webcast: How to Prepare Before the Compromise

Click on the timecodes to jump to that part of the video (on YouTube) Slides for this webcast can be found here: https://www.blackhillsinfosec.com/wp-content/uploads/2020/09/SLIDES_HowtoPrepareBeforeCompromise.pdf 00:40 Intro, background information, how to deal with […]

Read the entire post here
00411_10152019_CrackingPasswordsUmlauts

How-To, Informational Carrie Roberts, DPAT, Hashcat, NTLM, Password cracking, Umlauts

Cracking Passwords with Umlauts

Carrie Roberts // *Guest Blog You have a password hash you would like to crack for a password that contains an Umlaut. You know, the two dots over a letter […]

Read the entire post here
«‹ 36 37 38 39›»

Looking For Something?

Browse by category

Recent Posts

  • deadwood_headerWhen the SOC Goes to Deadwood: A Night to Remember 
    Hear a tale about the time the BHIS SOC team conducted
  • Social Engineering and Microsoft SSPRSocial Engineering and Microsoft SSPR: The Road to Pwnage is Paved with Good Intentions 
    This scenario simultaneously tests identity
  • cyber threats_headerCommon Cyber Threats
    In today’s interconnected digital world, information

Browse by topic

Active Directory ADHD AI anti-virus Attack Tactics AV Beau Bullock BHIS Blue Team C2 Carrie Roberts cloud Cyber Deception hacking Hashcat infosec Infosec for Beginners InfoSec Survival Guide Joff Thyer john strand Jordan Drysdale Kent Ickler Kerberos Linux MailSniper Microsoft Nessus Nmap passwords password spraying pen-testing penetration testing pentest Pentesting phishing PowerShell Python Red Team red teaming RITA Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security, Inc.

890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008


About Us | BHIS Tribe of Companies | Privacy Policy | Contact

Links
Search the site