Black Hills Information Security, Inc.
RSS
  • All Services
    • Complete Service Guide
    • Active SOC
    • AI Security Assessments
    • Blockchain Security
    • Blue Team Services
    • Continuous Penetration Testing
    • High-Profile Risk Assessments
    • Incident Response
    • Penetration Testing
  • Contact Us
    • Contact Us
    • Email Sign-Up
  • About Us
    • Security Consultants
    • Admin
    • SOC Team
    • Antisyphon Training
    • BHIS Tribe of Companies
  • Free Resources
    • Blogs
    • Free Cybersecurity Tools
    • Free Cybersecurity Webcasts
    • Podcasts
    • RITA
  • Training
    • BHIS & Antisyphon Training
    • WWHF Conference
  • Community
    • Discord
    • LinkedIn
    • YouTube
    • Bluesky
    • Twitter/X
    • Upcoming Events
  • Fun Stuff
    • Backdoors & Breaches
    • Merch, Zines & More
    • PROMPT# Zine
    • REKCAH
    • Books
BLOG_cheatsheet_

Ashley Knowles, Informational, InfoSec 101, Red Team Tools Cheatsheet, Impacket, Infosec for Beginners, InfoSec Survival Guide

Impacket Cheatsheet

Impacket is an extremely useful tool for post exploitation. It is a collection of Python scripts that provides low-level programmatic access to the packets and for some protocols, such as DCOM, Kerberos, SMB1, and MSRPC, the protocol implementation itself.

Read the entire post here
BLOG_cheatsheet_3

Informational, InfoSec 101, Red Team Tools Cheatsheet, Infosec for Beginners, InfoSec Survival Guide, Wireshark

Wireshark Cheatsheet

Wireshark is an incredible tool used to read and analyze network traffic coming in and out of an endpoint. Additionally, it can load previously captured traffic to assist with troubleshooting network issues or analyze malicious traffic to help determine what a threat actor is doing on your network.

Read the entire post here
BLOG_cheatsheet_7

Informational, InfoSec 101, Red Team Tools Cheatsheet, Hashcat, Infosec for Beginners, InfoSec Survival Guide

Hashcat Cheatsheet

Hashcat is a powerful tool for recovering lost passwords, and, thanks to GPU acceleration, it’s one of the fastest. It works by rapidly trying different password guesses to determine the original password from its scrambled (hashed) version.

Read the entire post here
BLOG_cheatsheet_8

Chris Traynor, Informational, InfoSec 101, Red Team Tools Cheatsheet, EyeWitness, Infosec for Beginners, InfoSec Survival Guide

EyeWitness Cheatsheet

Offensive Purpose: Efficient way to gather info about web services & their hosting infrastructure. Automates taking screenshots for quick & easy review.

Read the entire post here
BLOG_cheatsheet_9

Informational, InfoSec 101, Red Team Tools Cheatsheet, Infosec for Beginners, InfoSec Survival Guide, Nmap

Nmap Cheatsheet

Nmap is a powerful open-source tool commonly used by system/network administrators and security professionals to perform network discovery, security auditing, and basic vulnerability assessment.

Read the entire post here
BLOG_cheatsheet_2

Informational, InfoSec 101, Red Team Tools Infosec for Beginners, InfoSec Survival Guide, netcat

Netcat (nc) Cheatsheet 

Netcat is a network utility tool that has earned the nickname “The Swiss Army Knife” of networking. It can be used for file transfers, chat/messaging between systems, port scanning, and much more.

Read the entire post here
aircrackng_header

How-To, Informational, Physical, Recon, Sean Verity, Wireless aircrack-ng, airodump-ng

Hunt for Weak Spots in Your Wireless Network with Airodump-ng from the Aircrack-ng Suite

In this blog, I’m going to walk you through how to get started with airodump-ng and some of the techniques that you can use to home in on access points of interest.

Read the entire post here
ADCS_header

Alyssa Snow, Blue Team, Blue Team Tools, External/Internal, How-To, Informational Active Directory, ADCS

Detecting ADCS Privilege Escalation

Active Directory Certificate Services (ADCS) is used to manage certificates for systems, users, applications, and more in an enterprise environment. Misconfigurations in ADCS can introduce critical vulnerabilities into an enterprise Active Directory environment.

Read the entire post here
nmap_header

External/Internal, General InfoSec Tips & Tricks, How-To, Informational, InfoSec 101, Terry Reece Nmap, Vulnerability Scanning

Vulnerability Scanning with Nmap 

Nmap, also known as Network Mapper, is a commonly used network scanning tool. As penetration testers, Nmap is a tool we use daily that is indispensable for verifying configurations and identifying potential vulnerabilities.

Read the entire post here
«‹ 3 4 5 6›»

Looking For Something?

Browse by category

Recent Posts

  • cyber threats_headerCommon Cyber Threats
    In today’s interconnected digital world, information
  • pentest_headerFinding the Right Penetration Testing Company
    This blog is for anyone who is interested in finding a
  • deceptiveaud_header (2)Deceptive-Auditing: An Active Directory Honeypots Tool
    Deceptive-Auditing is a tool that deploys Active

Browse by topic

Active Directory ADHD AI anti-virus Attack Tactics AV Beau Bullock BHIS Blue Team C2 Carrie Roberts cloud Cyber Deception hacking Hashcat infosec Infosec for Beginners InfoSec Survival Guide Joff Thyer john strand Jordan Drysdale Kent Ickler Kerberos Linux MailSniper Microsoft Nessus Nmap passwords password spraying pen-testing penetration testing pentest Pentesting phishing PowerShell Python Red Team red teaming RITA Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security, Inc.

890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008


About Us | BHIS Tribe of Companies | Privacy Policy | Contact

Links
Search the site