Black Hills Information Security, Inc.
RSS
  • All Services
    • Complete Service Guide
    • Active SOC
    • AI Security Assessments
    • Blockchain Security
    • Blue Team Services
    • Continuous Penetration Testing
    • High-Profile Risk Assessments
    • Incident Response
    • Penetration Testing
  • Contact Us
    • Contact Us
    • Email Sign-Up
  • About Us
    • Security Consultants
    • Admin
    • SOC Team
    • Antisyphon Training
    • BHIS Tribe of Companies
  • Free Resources
    • Blogs
    • Free Cybersecurity Tools
    • Free Cybersecurity Webcasts
    • Podcasts
    • RITA
  • Training
    • BHIS & Antisyphon Training
    • WWHF Conference
  • Community
    • Discord
    • LinkedIn
    • YouTube
    • Bluesky
    • Twitter/X
    • Upcoming Events
  • Fun Stuff
    • Backdoors & Breaches
    • Merch, Zines & More
    • PROMPT# Zine
    • REKCAH
    • Books
BHIS_YT_TN_BLOCKCHAIN

Author, Beau Bullock, Informational, InfoSec 101, John Strand, Webcasts Attacks, Beau Bullock, BHIS, Bitcoin, Blockchain, john strand

BHIS Webcast: Blockchain and You! InfoSec Edition

Take a good look at Bitcoin right now… these are the unlucky ones. These are the unfortunate souls who jumped on another overinflated balloon. But, does this Bitcoin crash completely […]

Read the entire post here
00368_01282019_ISpyWithInSpy(2)

How-To, Password Spray, Recon, Red Team, Red Team Tools InSpy, password spraying, recon, recon tool, red team tools

I Spy with InSpy v3.0

Darin Roberts// Early in 2018 I wrote a blog about InSpy. InSpy is a great reconnaissance tool that gathers usernames from LinkedIn. My first blog can be found here. A […]

Read the entire post here
00367_01172019_BusinessSecurityStrategiesPart5(2)

Author, Blue Team, How-To, Informational, InfoSec 101, Jordan Drysdale Blue Team, Defensive Strategies, Jordan Drysdale, Security Strategies, Small Business, Small Business Security

Small and Medium Business Security Strategies: Part 5

Jordan Drysdale// tl;dr Inventory management and personnel management are critical to making this work. Often, the difference between your company becoming a statistic and catching someone with a foothold in […]

Read the entire post here
Sacred Cash Cow Tipping 2019

Author, John Strand, Red Team, Webcasts anti-virus, carbonblack, endpoint security, how to bypass Anti Virus, pen-testing, penetration testing, Red Team, Sacred Cash Cow Tipping

Webcast: Sacred Cash Cow Tipping 2019

John Strand // Yet again it is time for another edition of Sacred Cash Cow Tipping! Or, “Why do these endpoint security bypass techniques still work? Why?” The goal of […]

Read the entire post here
00364_01082019_SHHazam(2)

How-To, Informational C2, command and control, PowerShell Empire, SSH, SSHazam

SSHazam: Hide Your C2 Inside of SSH

Carrie Roberts //* SSHazam is a method of running any C2 tool of your choice inside a standard SSH tunnel to avoid network detections. The examples here involve running PowerShell […]

Read the entire post here
japan blog

Fun & Games, Informational, Social Engineering general infosec, informational, social engineering

Social Engineering in Japan

Kelsey Bellew//* It’s an occupational hazard to see vulnerabilities everywhere. When I see a router sitting in plain sight I think, “The default creds are probably printed on the back; […]

Read the entire post here
YouTube Dec 18

Author, Beau Bullock, Mike Felch, Red Team Tools, Webcasts Azure, Azure Active Directory, RDP, RDP logging Bypass, webcast

WEBCAST: RDP Logging Bypass and Azure Active Directory Recon

For this webcast we cover a couple of different topics. First, we talk about how to password spray in a non-attributable sort of way. Beau found a way to obfuscate […]

Read the entire post here
update

Author, Blue Team, Jordan Drysdale, Red Team BlueTeam, Cisco, External Pentest, internal pentest, Inventory, Jordan Drysdale, Nessus, RedTeam, SIET

Cisco Smart Install Escalation and Update!

Jordan Drysdale// tl;dr Both Cisco and Nessus have escalated the Smart Install Client Service feature/vulnerability. Nessus is now reporting the Smart Install RCE as critical. High five!!! Cisco has also […]

Read the entire post here
tools 2018

Author, John Strand, Red Team Tools, Webcasts tools, top tools, webcast, webcasts

WEBCAST: BHIS Sorta Top Used Tools of 2018

John Strand// In this webcast we cover some of the core tools we use all the time at Black Hills Information Security. However, there’s a twist. We don’t talk about […]

Read the entire post here
«‹ 41 42 43 44›»

Looking For Something?

Browse by category

Recent Posts

  • deadwood_headerWhen the SOC Goes to Deadwood: A Night to Remember 
    Hear a tale about the time the BHIS SOC team conducted
  • Social Engineering and Microsoft SSPRSocial Engineering and Microsoft SSPR: The Road to Pwnage is Paved with Good Intentions 
    This scenario simultaneously tests identity
  • cyber threats_headerCommon Cyber Threats
    In today’s interconnected digital world, information

Browse by topic

Active Directory ADHD AI anti-virus Attack Tactics AV Beau Bullock BHIS Blue Team C2 Carrie Roberts cloud Cyber Deception hacking Hashcat infosec Infosec for Beginners InfoSec Survival Guide Joff Thyer john strand Jordan Drysdale Kent Ickler Kerberos Linux MailSniper Microsoft Nessus Nmap passwords password spraying pen-testing penetration testing pentest Pentesting phishing PowerShell Python Red Team red teaming RITA Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security, Inc.

890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008


About Us | BHIS Tribe of Companies | Privacy Policy | Contact

Links
Search the site