Black Hills Information Security, Inc.
RSS
  • All Services
    • Complete Service Guide
    • Active SOC
    • AI Security Assessments
    • Blockchain Security
    • Blue Team Services
    • Continuous Penetration Testing
    • High-Profile Risk Assessments
    • Incident Response
    • Penetration Testing
  • Contact Us
    • Contact Us
    • Email Sign-Up
  • About Us
    • Security Consultants
    • Admin Team
    • Active SOC Team
    • Antisyphon Training
    • BHIS Tribe of Companies
  • Free Resources
    • Blogs
    • Free Cybersecurity Tools
    • Free Cybersecurity Webcasts
    • Podcasts
    • RITA
  • Training
    • BHIS & Antisyphon Training
    • WWHF Conference
  • Community
    • Discord
    • LinkedIn
    • YouTube
    • Bluesky
    • Twitter/X
    • Upcoming Events
  • Fun Stuff
    • Backdoors & Breaches
    • Merch, Zines & More
    • PROMPT# Zine
    • REKCAH
    • Books
00415_11042019_GSMTrafficEncryption

Author, Hardware Hacking, How-To, Informational, Ray Felch A5/1 Stream Cipher, GSM, Raymond Felch

GSM Traffic and Encryption: A5/1 Stream Cipher

Ray Felch // Disclaimer: Be sure to use a faraday bag or cage before transmitting cellular data so you don’t accidentally break any laws by illegally transmitting on regulated frequencies. Additionally, […]

Read the entire post here
00416_11012019_IntroToCCAT

How-To, Informational CCAT, Cisco Config Analysis Tool, kayla mackiewicz

How to Use CCAT: An Analysis Tool for Cisco Configuration Files

Kayla Mackiewicz // Last year, fellow tester Jordan Drysdale wrote a blog post about Cisco’s Smart Install feature. His blog post can be found here. If this feature is enabled […]

Read the entire post here
00414_10292019_IntroSoftwareDefinedRadio

Author, Hardware Hacking, How-To, Informational, InfoSec 101, Ray Felch GNURadio, GSM/LTE, Hackrf, Raymond Felch, RTL-SDR, SDR, Software Defined Radio, Wireshark

Intro to Software Defined Radio and GSM/LTE

Ray Felch // Disclaimer: Be sure to use a faraday bag or cage before transmitting cellular data so you don’t accidentally break any laws by illegally transmitting on regulated frequencies. […]

Read the entire post here
00413_10162019_WEBCAST_HowToPlayB&B

Author, How-To, Informational, John Strand, Webcasts Backdoors & Breaches, john strand

Webcast: How to Play Backdoors & Breaches, Incident Response Card Game

Slides for this webcast can be found here: https://www.blackhillsinfosec.com/wp-content/uploads/2020/09/SLIDES_HowToPlayBackdoorsBreaches.pdf More info: https://www.blackhillsinfosec.com/projects/backdoorsandbreaches/ 2:09 Introduction to the types of cards in the deck, pricing, why we created B&B 10:25 Basic setup […]

Read the entire post here
00412_10212019_WEBCAST_HowToPrepareBeforeTheCompromise

Author, Informational, John Strand, Webcasts Backdoors & Breaches, Firewall Logs, john strand, RITA, Server Analysis, SIEM, UBEA, Zeek

Webcast: How to Prepare Before the Compromise

Click on the timecodes to jump to that part of the video (on YouTube) Slides for this webcast can be found here: https://www.blackhillsinfosec.com/wp-content/uploads/2020/09/SLIDES_HowtoPrepareBeforeCompromise.pdf 00:40 Intro, background information, how to deal with […]

Read the entire post here
00411_10152019_CrackingPasswordsUmlauts

How-To, Informational Carrie Roberts, DPAT, Hashcat, NTLM, Password cracking, Umlauts

Cracking Passwords with Umlauts

Carrie Roberts // *Guest Blog You have a password hash you would like to crack for a password that contains an Umlaut. You know, the two dots over a letter […]

Read the entire post here
00410_10102019_WEBCAST_SILENTTRINITY

Author, Informational, John Strand, Marcello Salvati, Red Team, Red Team Tools, Webcasts BYOI, john strand, Marcello Salvati, SILENTTRINITY

Webcast: In-Depth SILENTTRINITY Demo, Explanation & Walkthrough

Click on the timecodes to jump to that part of the video (on YouTube) Slides for this webcast can be found here: https://www.blackhillsinfosec.com/wp-content/uploads/2020/09/SLIDES_SILENTTRINITYIndepthDemo.pdf 1:07 Quick review of SILENTTRINITY functions, an overview […]

Read the entire post here
00409_10072019_WEBCAST_CloudTradeCraft

Author, Informational, John Strand, Jordan Drysdale, Webcasts cloud tradecraft, EyeWitness, GoWitness, Hadoop, john strand, Jordan Drysdale, MapReduce, Open-Source, Webshot

Webcast: Open Source Exploits in the Cloud’s Big Data Services – Cloud TradeCraft

Click on the timecodes to jump to that part of the video (on YouTube) Slides for this webcast can be found here: https://www.blackhillsinfosec.com/wp-content/uploads/2020/09/SLIDES_OpenSourceExploitsinCloudsBigDataServices.pdf 4:18 Problem statement and exploitation timeline8:28 MapReduce and […]

Read the entire post here
00408_10022019_DNSServerUsedForDDoSAttacks

Author, Blue Team, Informational, InfoSec 101, Melissa Bruno BIND, DDoS, DNS, DNS cache snooping, Mail Relay Servers, Melissa Bruno

Do You Know If Your DNS Server Can Be Used For DDoS Attacks?

Melissa Bruno // So you have an Internet-facing DNS server. Maybe you decided to set one up at home for fun, or your company has one that works with other […]

Read the entire post here
«‹ 37 38 39 40›»

Looking For Something?

Browse by category

Recent Posts

  • How To Lead Effective Cybersecurity TabletopsHow to Lead Effective Tabletops
    Learn how to transform boring, meeting-style security
  • grc_header (1)Understanding GRC: How to Navigate Risks and Compliance Standards
    “GRC” isn’t all witchcraft and administrative
  • Linux Persistence For PentestersThe “P” in PAM is for Persistence: Linux Persistence Technique
    Learn about a pentesting tool using the Pluggable

Browse by topic

Active Directory ADHD AI anti-virus Attack Tactics AV Beau Bullock BHIS Blue Team C2 Carrie Roberts cloud Cyber Deception hacking infosec Infosec for Beginners InfoSec Survival Guide Joff Thyer john strand Jordan Drysdale Kent Ickler Kerberos Linux MailSniper Malware Microsoft Nessus Nmap passwords password spraying pen-testing penetration testing pentest Pentesting phishing PowerShell Python Red Team red teaming RITA Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security, Inc.

890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008


About Us | BHIS Tribe of Companies | Privacy Policy | Contact

Links
Search the site