Black Hills Information Security, Inc.
RSS
  • All Services
    • Complete Service Guide
    • Active SOC
    • AI Security Assessments
    • Blockchain Security
    • Blue Team Services
    • Continuous Penetration Testing
    • High-Profile Risk Assessments
    • Incident Response
    • Penetration Testing
  • Contact Us
    • Contact Us
    • Email Sign-Up
  • About Us
    • Security Consultants
    • Admin
    • SOC Team
    • BHIS Family of Companies
  • Free Resources
    • Blogs
    • Free Cybersecurity Tools
    • Free Cybersecurity Webcasts
    • Podcasts
    • RITA
  • Training
    • BHIS & Antisyphon Training
    • WWHF Conference
  • Online Community
    • Discord
    • LinkedIn
    • YouTube
    • Bluesky
    • Twitter/X
    • Upcoming Events
  • Fun Stuff
    • Backdoors & Breaches
    • Merch, Zines & More
    • PROMPT# Zine
    • REKCAH
    • Books
espanso_header (1)

Chris Sullo', General InfoSec Tips & Tricks, How-To, Informational espanso, text expander, text replacement

Espanso: Text Replacement, the Easy Way

Espanso is a powerful cross-platform and open-source text replacement (or text expander) tool. At a simple level: it replaces what you type with something else.

Read the entire post here
copilotbronwen_header

Blue Team Tools, Bronwen Aker, General InfoSec Tips & Tricks, Informational Copilot, Cyber Deception, LLM

Caging Copilot: Lessons Learned in LLM Security

For those of us in cybersecurity, there are a lot of unanswered questions and associated concerns about integrating AI into these various products. No small part of our worries has to do with the fact that this is new technology, and new tech always brings with it new security issues, especially technology that is evolving as quickly as AI.

Read the entire post here
copilot_header

Craig Vincent, How-To, Informational AI, artifical intelligence, Copilot, penetration testing, Pentesting

Augmenting Penetration Testing Methodology with Artificial Intelligence – Part 2: Copilot

A common use case for LLMs is rapid software development. One of the first ways I used AI in my penetration testing methodology was for payload generation.

Read the entire post here
burpference_header

Informational, Red Team AI, artifical intelligence, Artificial Intelligence, burpference, penetration testing

Augmenting Penetration Testing Methodology with Artificial Intelligence – Part 1: Burpference

Burpference is a Burp Suite plugin that takes requests and responses to and from in-scope web applications and sends them off to an LLM for inference. In the context of artificial intelligence, inference is taking a trained model, providing it with new information, and asking it to analyze this new information based on its training.

Read the entire post here
trafficproxy_header (1)

Cameron Cartier, Dave Blandford, Informational, Mobile Flutter, proxy, traffic interception

Intercepting Traffic for Mobile Applications that Bypass the System Proxy

This is a foolproof guide to intercepting traffic from mobile applications built on Flutter, which historically have been especially challenging to intercept.

Read the entire post here
RootAndroid_header

Dave Blandford, Informational, Mobile Android, root, root user, Rooting, superuser

How to Root Android Phones

This blog will cover how to root an AVD emulator and a physical Pixel 6. But before we cover those topics, let’s cover what it is we will be doing and some of the pro/cons of rooting an Android phone.

Read the entire post here
BLOG_chalkboard_00717 (1)

Blue Team, Dale Hobbs, Informational, InfoSec 101 Boardroom Cybersecurity, Business-Driven Security, C-Suite Engagement, Cyber Risk Awareness, Cybersecurity Communication, Executive Buy-In, Financial Impact of Cybersecurity, Risk Management, Security Leadership, Security Strategy

Communicating Security to the C-Suite: A Strategic Approach 

Engaging with the C-suite is not just about addressing security concerns or defending budget requests. It’s about establishing and maintaining an ongoing discussion that aims to align security objectives with the interests of the business.  

Read the entire post here
BLOG_chalkboard_00716

Ben Bowman, How-To, Informational, Red Team, Red Team Tools Forensics, Memory Forensics, Volatility

Offline Memory Forensics With Volatility

Volatility is a memory forensics tool that can pull SAM hashes from a vmem file. These hashes can be used to escalate from a local user or no user to a domain user leading to further compromise.

Read the entire post here
Getting Started with AI Hacking

Brian Fehrman, How-To AI, AI Hacking, Artificial Intelligence, Hacking Classifiers, Machine Learning

Getting Started with AI Hacking: Part 1

You may have read some of our previous blog posts on Artificial Intelligence (AI). We discussed things like using PyRIT to help automate attacks. We also covered the dangers of […]

Read the entire post here
«‹ 4 5 6 7›»

Looking For Something?

Browse by category

Recent Posts

  • del3_headerAbusing Delegation with Impacket (Part 3): Resource-Based Constrained Delegation
    This is the third in a three-part series of blog posts
  • HACKED2025_headerWhy You Got Hacked – 2025 Super Edition
    This article was written to provide readers with an
  • del2_headerAbusing Delegation with Impacket (Part 2): Constrained Delegation
    This is the second in a three-part series of blog

Browse by topic

Active Directory ADHD AI anti-virus Attack Tactics AV Beau Bullock BHIS Blue Team C2 Carrie Roberts cloud Cyber Deception hacking Hashcat infosec Infosec for Beginners InfoSec Survival Guide Joff Thyer john strand Jordan Drysdale Kent Ickler Kerberos Linux MailSniper Microsoft Nessus Nmap passwords password spraying pen-testing penetration testing pentest Pentesting phishing PowerShell Python Red Team red teaming RITA Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security, Inc.

890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008


About Us | BHIS Tribe of Companies | Privacy Policy | Contact

Links
Search the site