Black Hills Information Security, Inc.
RSS
  • All Services
    • Complete Service Guide
    • Active SOC
    • AI Security Assessments
    • Blockchain Security
    • Blue Team Services
    • Continuous Penetration Testing
    • High-Profile Risk Assessments
    • Incident Response
    • Penetration Testing
  • Contact Us
    • Contact Us
    • Email Sign-Up
  • About Us
    • Security Consultants
    • Admin
    • SOC Team
    • Antisyphon Training
    • BHIS Family of Companies
  • Free Resources
    • Blogs
    • Free Cybersecurity Tools
    • Free Cybersecurity Webcasts
    • Podcasts
    • RITA
  • Training
    • BHIS & Antisyphon Training
    • WWHF Conference
  • Online Community
    • Discord
    • LinkedIn
    • YouTube
    • Bluesky
    • Twitter/X
    • Upcoming Events
  • Fun Stuff
    • Backdoors & Breaches
    • Merch, Zines & More
    • PROMPT# Zine
    • REKCAH
    • Books
AWS small

Red Team, Red Team Tools AWS, Carnal0wnage, Compromise, SEC504, WeirdAAL

AWS: Assuming Access Key Compromise

Jordan Drysdale//* In this blog, we are assuming that we have obtained an access key, a secret key and maybe a .pem key from a network user who left these […]

Read the entire post here
What to do after a penetration test

Blue Team, Finding, General InfoSec Tips & Tricks, How-To, Informational after the pen test, how to deal with you penetration test results, What to do after a penetration test, what to do after a pentest

What to Expect After a Pen Test

Scott Worden* // So you and your company had a pen test…now what? What to do, how to plan, and good SQUIRREL! ways to stay on track.   The 3 […]

Read the entire post here
C2 WSC2 small

C2, Craig Vincent, Red Team C2, command and control, Red Team, WebSockets, WSC2

Command and Control with WebSockets WSC2

Craig Vincent// This all started with a conversation I was having with a few other BHIS testers. At the time, I was testing a web application that used WebSockets. The […]

Read the entire post here
Scouting AWS small

Author, Blue Team, How-To, Jordan Drysdale Amazon Web Services, AWS, Best Practices, Blue Team, Jordan Drysdale, Scout2

Scout2 Usage: AWS Infrastructure Security Best Practices

Jordan Drysdale// Full disclosure and tl;dr: The NCC Group has developed an amazing toolkit for analyzing your AWS infrastructure against Amazon’s best practices guidelines. Start here: https://github.com/nccgroup/Scout2 Then, access your […]

Read the entire post here
gsuites

Red Team G Suite, gmail

G Suite is the Soft Underbelly of Your Environment

Matthew Toussain//* Wouldn’t you like to START your pentests knowing every username for all individuals in your target environment? Gmail, G Suite, Outlook Web Access, Exchange Web Services… Email. A […]

Read the entire post here
H

Author, Beau Bullock, InfoSec 101, Mike Felch, Webcasts information security, infosec, meetups, public speaking, webcast, webcasts

WEBCAST: Highly Caffeinated InfoSec

Beau Bullock & Mike Felch// Ways to Learn More, Network, and Wake Up Your Inner Hacker Whether you are brand new to InfoSec or a skilled veteran there are ways […]

Read the entire post here
00317_07102018_WEBCAST_AttackTacticsPart3

Author, John Strand, Red Team, Webcasts Attack Tactics, Red Team, webcast, webcasts

WEBCAST: Attack Tactics 3

John Strand// For this next installment of our Attack Tactics webcast series, John Strand looks at an environment that had no Active Directory. This is odd, but it’s becoming more […]

Read the entire post here
June

Fun & Games Wild West Hackin' Fest

Free Ticket to the Most Hands-on Infosec Con

For the entire month of June, we ran a contest on our Twitter with the grand prize being a free ticket to Wild West Hackin’ Fest! We were quick to […]

Read the entire post here
hacker tools

Red Team, Red Team Tools, Webcasts hacker tools, Microsoft, webcast, webcasts

WEBCAST: Hacker Tools, Compliments of Microsoft

David Fletcher & Sally Vandeven// Join David “Fletch” and Sally as they explore the cornucopia of wonderful, free tools in the SysInternals Suite that conveniently are signed by Microsoft and […]

Read the entire post here
«‹ 44 45 46 47›»

Looking For Something?

Browse by category

Recent Posts

  • smart goals_header (1)How to Set Smart Goals (That Actually Work For You)
    Setting goals is a deceptively simple career skill we
  • socinterview_headerInside the BHIS SOC: A Conversation with Hayden CovingtonĀ 
    What happens when you ditch the tiered ticket queues
  • del3_headerAbusing Delegation with Impacket (Part 3): Resource-Based Constrained Delegation
    This is the third in a three-part series of blog posts

Browse by topic

Active Directory ADHD AI anti-virus Attack Tactics AV Beau Bullock BHIS Blue Team C2 Carrie Roberts cloud Cyber Deception hacking Hashcat infosec Infosec for Beginners InfoSec Survival Guide Joff Thyer john strand Jordan Drysdale Kent Ickler Kerberos Linux MailSniper Microsoft Nessus Nmap passwords password spraying pen-testing penetration testing pentest Pentesting phishing PowerShell Python Red Team red teaming RITA Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security, Inc.

890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008


About Us | BHIS Tribe of Companies | Privacy Policy | Contact

Links
Search the site