Black Hills Information Security, Inc.
RSS
  • All Services
    • Complete Service Guide
    • Active SOC
    • AI Security Assessments
    • Blockchain Security
    • Blue Team Services
    • Continuous Penetration Testing
    • High-Profile Risk Assessments
    • Incident Response
    • Penetration Testing
  • Contact Us
    • Contact Us
    • Email Sign-Up
  • About Us
    • Security Consultants
    • Admin
    • SOC Team
    • Antisyphon Training
    • BHIS Tribe of Companies
  • Free Resources
    • Blogs
    • Free Cybersecurity Tools
    • Free Cybersecurity Webcasts
    • Podcasts
    • RITA
  • Training
    • BHIS & Antisyphon Training
    • WWHF Conference
  • Community
    • Discord
    • LinkedIn
    • YouTube
    • Bluesky
    • Twitter/X
    • Upcoming Events
  • Fun Stuff
    • Backdoors & Breaches
    • Merch, Zines & More
    • PROMPT# Zine
    • REKCAH
    • Books
00374_02282019_RDPThroughSSH (1)

External/Internal, How-To, Informational, Red Team BHIS, Black Hills Information Security, Carrie Roberts, RDP, SSH

The RDP Through SSH Encyclopedia

Carrie Roberts //* I have needed to remind myself how to set up RDP access through an SSH connection so many times that I’ve decided to document it here for […]

Read the entire post here
00372_02252019_WEBCAST_EndpointSecurityGotYouDown

Informational, Red Team, Red Team Tools, Webcasts .Net, BYOI, EDR, Endpoint, Marcello, Open-Source, PowerShell, Red Team, SILENTTRINITY, Tradecraft, Windows Defender

Webcast: Endpoint Security Got You Down? No PowerShell? No Problem.

Do your PowerShell scripts keep getting caught? Tired of dealing with EDRs & Windows Defender every time you need to pop a box?  In this one-hour webcast, we introduce a somewhat […]

Read the entire post here
J3

Author, Informational, John Strand john strand, SANS, SEC504

I’m Resigning From SANS

John Strand// Hello all, Well, this is a painful post to write, so I will get right to it. I am on my last run of classes with the SANS […]

Read the entire post here
BHIS_BLOG_PowerShell Win Defender

C2, How-To, Informational, Red Team, Red Team Tools .Net, Carrie Roberts, PowerShell, PowerShell Empire, Red Team, Windows 10, Windows Defender

Getting PowerShell Empire Past Windows Defender

Carrie Roberts //* (Updated 2/12/2020) ADVISORY: The techniques and tools referenced within this blog post may be outdated and do not apply to current situations. However, there is still potential […]

Read the entire post here
BHIS_YT_TN_BLOCKCHAIN

Author, Beau Bullock, Informational, InfoSec 101, John Strand, Webcasts Attacks, Beau Bullock, BHIS, Bitcoin, Blockchain, john strand

BHIS Webcast: Blockchain and You! InfoSec Edition

Take a good look at Bitcoin right now… these are the unlucky ones. These are the unfortunate souls who jumped on another overinflated balloon. But, does this Bitcoin crash completely […]

Read the entire post here
00368_01282019_ISpyWithInSpy(2)

How-To, Password Spray, Recon, Red Team, Red Team Tools InSpy, password spraying, recon, recon tool, red team tools

I Spy with InSpy v3.0

Darin Roberts// Early in 2018 I wrote a blog about InSpy. InSpy is a great reconnaissance tool that gathers usernames from LinkedIn. My first blog can be found here. A […]

Read the entire post here
00367_01172019_BusinessSecurityStrategiesPart5(2)

Author, Blue Team, How-To, Informational, InfoSec 101, Jordan Drysdale Blue Team, Defensive Strategies, Jordan Drysdale, Security Strategies, Small Business, Small Business Security

Small and Medium Business Security Strategies: Part 5

Jordan Drysdale// tl;dr Inventory management and personnel management are critical to making this work. Often, the difference between your company becoming a statistic and catching someone with a foothold in […]

Read the entire post here
Sacred Cash Cow Tipping 2019

Author, John Strand, Red Team, Webcasts anti-virus, carbonblack, endpoint security, how to bypass Anti Virus, pen-testing, penetration testing, Red Team, Sacred Cash Cow Tipping

Webcast: Sacred Cash Cow Tipping 2019

John Strand // Yet again it is time for another edition of Sacred Cash Cow Tipping! Or, “Why do these endpoint security bypass techniques still work? Why?” The goal of […]

Read the entire post here
00364_01082019_SHHazam(2)

How-To, Informational C2, command and control, PowerShell Empire, SSH, SSHazam

SSHazam: Hide Your C2 Inside of SSH

Carrie Roberts //* SSHazam is a method of running any C2 tool of your choice inside a standard SSH tunnel to avoid network detections. The examples here involve running PowerShell […]

Read the entire post here
«‹ 41 42 43 44›»

Looking For Something?

Browse by category

Recent Posts

  • Linux Persistence For PentestersThe “P” in PAM is for Persistence: Linux Persistence Technique
    Learn about a pentesting tool using the Pluggable
  • malanalysis_headerMalware Analysis: How to Analyze and Understand Malware
    Malware analysis is an amazing field that can be
  • OSINT_headerOSINT: How to Find, Use, and Control Open-Source Intelligence
    OSINT stands for open-source intelligence, and it

Browse by topic

Active Directory ADHD AI anti-virus Attack Tactics AV Beau Bullock BHIS Blue Team C2 Carrie Roberts cloud Cyber Deception hacking infosec Infosec for Beginners InfoSec Survival Guide Joff Thyer john strand Jordan Drysdale Kent Ickler Kerberos Linux MailSniper Malware Microsoft Nessus Nmap passwords password spraying pen-testing penetration testing pentest Pentesting phishing PowerShell Python Red Team red teaming RITA Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security, Inc.

890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008


About Us | BHIS Tribe of Companies | Privacy Policy | Contact

Links
Search the site