Black Hills Information Security, Inc.
RSS
  • All Services
    • Complete Service Guide
    • Active SOC
    • AI Security Assessments
    • Blockchain Security
    • Blue Team Services
    • Continuous Penetration Testing
    • High-Profile Risk Assessments
    • Incident Response
    • Penetration Testing
  • Contact Us
    • Contact Us
    • Email Sign-Up
  • About Us
    • Security Consultants
    • Admin
    • SOC Team
    • Antisyphon Training
    • BHIS Tribe of Companies
  • Free Resources
    • Blogs
    • Free Cybersecurity Tools
    • Free Cybersecurity Webcasts
    • Podcasts
    • RITA
  • Training
    • BHIS & Antisyphon Training
    • WWHF Conference
  • Community
    • Discord
    • LinkedIn
    • YouTube
    • Bluesky
    • Twitter/X
    • Upcoming Events
  • Fun Stuff
    • Backdoors & Breaches
    • Merch, Zines & More
    • PROMPT# Zine
    • REKCAH
    • Books
sdr

Informational SDR, Software Defined Radio, webcast, webcasts

WEBCAST: SDR Quick Start Guide

Paul Clark* // What is Software Defined Radio and why should you, the noble InfoSec professional, care about it? What kind of hardware and software do you need to start […]

Read the entire post here
tipping_point

Fun & Games, Informational Factoria Labs, GNURadio, Laurel & Yanny, SDR, Software Defined Radio, Sound Experiments

GNURadio Can Make You Hear Laurel & Yanny

Paul Clark* // Feeling uncomfortably productive today? I’ve got a remedy for that, involving internet memes and signal processing. Come and waste a few minutes of your day with Laurel, […]

Read the entire post here
00301_05172018_C2C3WhateverItTakes

C2, How-To C2, command and control, metasploit

C2, C3, Whatever It Takes

Darin Roberts// If you have been in the security field for any length of time at all you have heard the term C2.  You might have heard it also called […]

Read the entire post here
Robotic maintenance repair fix concept. IT specialist robot, smiley red head, chip usb flash stick, quote Welcome to industry 4.0. Retro computer, error warning message blue screen. Beige background

How-To Bus Pirate, hardware hacking, Shikra

Hardware Hacking with Shikra

Rick Wisser// Comparing Apples to Oranges (Bus Pirate vs Shikra) this a Hardware Hacking 101 webcast follow up blog post. I recently did a hardware hacking webcast on hacking a router […]

Read the entire post here
00299_05102018_CrackOfficePasswordsWithDictionary

Author, External/Internal, How-To, Kent Ickler, Password Cracking AES, CeWL, decrypt, dictionary, encryption, Exce, Hashcat, John the Ripper, JTR, Kent Ickler, LinkedIn, microsoft office, Office, SHA, wordlist

How to Crack Office Passwords with a Dictionary

Kent Ickler// TLDR: We use a custom dictionary to crack Microsoft Office document encryption.  Then we use a custom dictionary for pwnage in LinkedIn hash database. Background: I recently got […]

Read the entire post here
00298_05072018_WEBCAST_WebAppAssessments

Author, Brian King, Web App, Webcasts Web App, Web App Assessment, Web Apps, webcast, webcasts

WEBCAST: Web App Assessments for Non-Majors

BB King // BB King looks at testing modern web apps in that “enterprise environment” so many of us inhabit. Taking the perspective of the Lonely Application Security Person in […]

Read the entire post here
00297_05032018_GotPrivsCrackThoseHashes

Author, Joff Thyer, Red Team, Red Team Tools Crack Hashes, Joff Thyer

Got Privs? Crack Those Hashes!

Joff Thyer // Black Hills Information Security loves performing both internal penetration tests, as well as command and control testing for our customers. Thanks to the efforts of many great […]

Read the entire post here
GDPR

Author, CJ Cox, Informational, Webcasts GDPR, General Data Protection Regulation, webcast, webcasts

WEBCAST: GDPR – Spring Storm Warning

CJ Cox// Spring storms are often more dangerous and unpredictable than winter storms. The GDPR looks to be no exception. The General Data Protection Regulation is a universal law brought […]

Read the entire post here
SMB 4

Author, Blue Team, How-To, Informational, InfoSec 101, Jordan Drysdale Critical Controls, Jordan Drysdale, Medium Business, Security Stratigies, Small Business, Vulnerability Management

Small and Medium Business Security Strategies: Part 4

Jordan Drysdale// tl;dr Vulnerability management is a part of doing business and operating on the public internet these days. Include training as part of this Critical Control. Users should be […]

Read the entire post here
«‹ 47 48 49 50›»

Looking For Something?

Browse by category

Recent Posts

  • deadwood_headerWhen the SOC Goes to Deadwood: A Night to Remember 
    Hear a tale about the time the BHIS SOC team conducted
  • Social Engineering and Microsoft SSPRSocial Engineering and Microsoft SSPR: The Road to Pwnage is Paved with Good Intentions 
    This scenario simultaneously tests identity
  • cyber threats_headerCommon Cyber Threats
    In today’s interconnected digital world, information

Browse by topic

Active Directory ADHD AI anti-virus Attack Tactics AV Beau Bullock BHIS Blue Team C2 Carrie Roberts cloud Cyber Deception hacking Hashcat infosec Infosec for Beginners InfoSec Survival Guide Joff Thyer john strand Jordan Drysdale Kent Ickler Kerberos Linux MailSniper Microsoft Nessus Nmap passwords password spraying pen-testing penetration testing pentest Pentesting phishing PowerShell Python Red Team red teaming RITA Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security, Inc.

890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008


About Us | BHIS Tribe of Companies | Privacy Policy | Contact

Links
Search the site