Black Hills Information Security, Inc.
RSS
  • All Services
    • Complete Service Guide
    • Active SOC
    • AI Security Assessments
    • Blockchain Security
    • Blue Team Services
    • Continuous Penetration Testing
    • High-Profile Risk Assessments
    • Incident Response
    • Penetration Testing
  • Contact Us
    • Contact Us
    • Email Sign-Up
  • About Us
    • Security Consultants
    • Admin
    • SOC Team
    • Antisyphon Training
    • BHIS Tribe of Companies
  • Free Resources
    • Blogs
    • Free Cybersecurity Tools
    • Free Cybersecurity Webcasts
    • Podcasts
    • RITA
  • Training
    • BHIS & Antisyphon Training
    • WWHF Conference
  • Community
    • Discord
    • LinkedIn
    • YouTube
    • Bluesky
    • Twitter/X
    • Upcoming Events
  • Fun Stuff
    • Backdoors & Breaches
    • Merch, Zines & More
    • PROMPT# Zine
    • REKCAH
    • Books
direct_send_header

Blue Team Tools, How-To, Hunt Teaming, Incident Response, Informational, InfoSec 201, Patterson Cake evtx, hayabusa, SOF-ELK

Stop Spoofing Yourself! Disabling M365 Direct Send

Remember the good ‘ol days of Zip drives, Winamp, the advent of “Office 365,” and copy machines that didn’t understand email authentication? Okay, maybe they weren’t so good! For a […]

Read the entire post here
Introducing JSONPeek and CSP B Gone

Informational, Jack Hyland, Red Team, Web App CSP, CSP B Gone, JSONPeek

Bypassing CSP with JSONP: Introducing JSONPeek and CSP B Gone

A Content Security Policy (CSP) is a security mechanism implemented by web servers and enforced by browsers to prevent various types of attacks, primarily cross-site scripting (XSS). CSP works by restricting resources (scripts, stylesheets, images, etc.) on a webpage to only execute if they come from approved sources. However, like most things in security, CSP isn’t bulletproof.

Read the entire post here
BLOG_cheatsheet_

Informational, InfoSec 101, Red Team, Red Team Tools Cheatsheets, Infosec for Beginners, InfoSec Survival Guide

Offensive Tooling Cheatsheets: An Infosec Survival Guide Resource

An Infosec Survival Guide Resource, released as blog posts, with fully designed, printer-friendly PDF cheatsheets.

Read the entire post here
BLOG_cheatsheet_10

General InfoSec Tips & Tricks, Informational, InfoSec 101, Michael Allen, Red Team Tools Cheatsheet, DNS Triage, Infosec for Beginners, InfoSec Survival Guide

DNS Triage Cheatsheet

DNS Triage is a reconnaissance tool that finds information about an organization’s infrastructure, software, and third-party services as fast as possible. The goal of DNS Triage is not to exhaustively find every technology asset that exists on the internet. The goal is to find the most commonly abused items of interest for real attackers.

Read the entire post here
BLOG_cheatsheet_5

Beau Bullock, General InfoSec Tips & Tricks, Informational, InfoSec 101, Kaitlyn Wimberley, Red Team Tools Cheatsheet, GraphRunner, Infosec for Beginners, InfoSec Survival Guide

GraphRunner Cheatsheet

GraphRunner is a collection of post-exploitation PowerShell modules for interacting with the Microsoft Graph API. It provides modules for enumeration, exfiltration, persistence, and more!

Read the entire post here
BLOG_cheatsheet_4

Brian King, General InfoSec Tips & Tricks, Informational, InfoSec 101, Red Team Tools Burp Suite, Cheatsheet, Infosec for Beginners, InfoSec Survival Guide

Burp Suite Cheatsheet

Burp Suite is an intercepting HTTP proxy that can also scan a web-based service for vulnerabilities. A tool like this is indispensable for testing web applications. Burp Suite is written in Java and comes bundled with a JVM, so it works on any operating system you’re likely to use.

Read the entire post here
BLOG_cheatsheet_

Ashley Knowles, Informational, InfoSec 101, Red Team Tools Cheatsheet, Impacket, Infosec for Beginners, InfoSec Survival Guide

Impacket Cheatsheet

Impacket is an extremely useful tool for post exploitation. It is a collection of Python scripts that provides low-level programmatic access to the packets and for some protocols, such as DCOM, Kerberos, SMB1, and MSRPC, the protocol implementation itself.

Read the entire post here
BLOG_cheatsheet_3

Informational, InfoSec 101, Red Team Tools Cheatsheet, Infosec for Beginners, InfoSec Survival Guide, Wireshark

Wireshark Cheatsheet

Wireshark is an incredible tool used to read and analyze network traffic coming in and out of an endpoint. Additionally, it can load previously captured traffic to assist with troubleshooting network issues or analyze malicious traffic to help determine what a threat actor is doing on your network.

Read the entire post here
BLOG_cheatsheet_7

Informational, InfoSec 101, Red Team Tools Cheatsheet, Hashcat, Infosec for Beginners, InfoSec Survival Guide

Hashcat Cheatsheet

Hashcat is a powerful tool for recovering lost passwords, and, thanks to GPU acceleration, it’s one of the fastest. It works by rapidly trying different password guesses to determine the original password from its scrambled (hashed) version.

Read the entire post here
«‹ 3 4 5 6›»

Looking For Something?

Browse by category

Recent Posts

  • Linux Persistence For PentestersThe “P” in PAM is for Persistence: Linux Persistence Technique
    Learn about a pentesting tool using the Pluggable
  • malanalysis_headerMalware Analysis: How to Analyze and Understand Malware
    Malware analysis is an amazing field that can be
  • OSINT_headerOSINT: How to Find, Use, and Control Open-Source Intelligence
    OSINT stands for open-source intelligence, and it

Browse by topic

Active Directory ADHD AI anti-virus Attack Tactics AV Beau Bullock BHIS Blue Team C2 Carrie Roberts cloud Cyber Deception hacking infosec Infosec for Beginners InfoSec Survival Guide Joff Thyer john strand Jordan Drysdale Kent Ickler Kerberos Linux MailSniper Malware Microsoft Nessus Nmap passwords password spraying pen-testing penetration testing pentest Pentesting phishing PowerShell Python Red Team red teaming RITA Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security, Inc.

890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008


About Us | BHIS Tribe of Companies | Privacy Policy | Contact

Links
Search the site