Black Hills Information Security, Inc.
RSS
  • All Services
    • Complete Service Guide
    • Active SOC
    • AI Security Assessments
    • Blockchain Security
    • Blue Team Services
    • Continuous Penetration Testing
    • High-Profile Risk Assessments
    • Incident Response
    • Penetration Testing
  • Contact Us
    • Contact Us
    • Email Sign-Up
  • About Us
    • Security Consultants
    • Admin
    • SOC Team
    • Antisyphon Training
    • BHIS Tribe of Companies
  • Free Resources
    • Blogs
    • Free Cybersecurity Tools
    • Free Cybersecurity Webcasts
    • Podcasts
    • RITA
  • Training
    • BHIS & Antisyphon Training
    • WWHF Conference
  • Community
    • Discord
    • LinkedIn
    • YouTube
    • Bluesky
    • Twitter/X
    • Upcoming Events
  • Fun Stuff
    • Backdoors & Breaches
    • Merch, Zines & More
    • PROMPT# Zine
    • REKCAH
    • Books
BLOG_cheatsheet_3

Informational, InfoSec 101, Red Team Tools Cheatsheet, Infosec for Beginners, InfoSec Survival Guide, Wireshark

Wireshark Cheatsheet

Wireshark is an incredible tool used to read and analyze network traffic coming in and out of an endpoint. Additionally, it can load previously captured traffic to assist with troubleshooting network issues or analyze malicious traffic to help determine what a threat actor is doing on your network.

Read the entire post here
BLOG_cheatsheet_7

Informational, InfoSec 101, Red Team Tools Cheatsheet, Hashcat, Infosec for Beginners, InfoSec Survival Guide

Hashcat Cheatsheet

Hashcat is a powerful tool for recovering lost passwords, and, thanks to GPU acceleration, it’s one of the fastest. It works by rapidly trying different password guesses to determine the original password from its scrambled (hashed) version.

Read the entire post here
BLOG_cheatsheet_8

Chris Traynor, Informational, InfoSec 101, Red Team Tools Cheatsheet, EyeWitness, Infosec for Beginners, InfoSec Survival Guide

EyeWitness Cheatsheet

Offensive Purpose: Efficient way to gather info about web services & their hosting infrastructure. Automates taking screenshots for quick & easy review.

Read the entire post here
BLOG_cheatsheet_9

Informational, InfoSec 101, Red Team Tools Cheatsheet, Infosec for Beginners, InfoSec Survival Guide, Nmap

Nmap Cheatsheet

Nmap is a powerful open-source tool commonly used by system/network administrators and security professionals to perform network discovery, security auditing, and basic vulnerability assessment.

Read the entire post here
BLOG_cheatsheet_2

Informational, InfoSec 101, Red Team Tools Infosec for Beginners, InfoSec Survival Guide, netcat

Netcat (nc) Cheatsheet 

Netcat is a network utility tool that has earned the nickname “The Swiss Army Knife” of networking. It can be used for file transfers, chat/messaging between systems, port scanning, and much more.

Read the entire post here
aircrackng_header

How-To, Informational, Physical, Recon, Sean Verity, Wireless aircrack-ng, airodump-ng

Hunt for Weak Spots in Your Wireless Network with Airodump-ng from the Aircrack-ng Suite

In this blog, I’m going to walk you through how to get started with airodump-ng and some of the techniques that you can use to home in on access points of interest.

Read the entire post here
ADCS_header

Alyssa Snow, Blue Team, Blue Team Tools, External/Internal, How-To, Informational Active Directory, ADCS

Detecting ADCS Privilege Escalation

Active Directory Certificate Services (ADCS) is used to manage certificates for systems, users, applications, and more in an enterprise environment. Misconfigurations in ADCS can introduce critical vulnerabilities into an enterprise Active Directory environment.

Read the entire post here
nmap_header

External/Internal, General InfoSec Tips & Tricks, How-To, Informational, InfoSec 101, Terry Reece Nmap, Vulnerability Scanning

Vulnerability Scanning with Nmap 

Nmap, also known as Network Mapper, is a commonly used network scanning tool. As penetration testers, Nmap is a tool we use daily that is indispensable for verifying configurations and identifying potential vulnerabilities.

Read the entire post here
netexec_header

Dale Hobbs, External/Internal, How-To, Informational, Password Spray, Red Team, Red Team Tools Active Directory Enumeration, Authentication Testing, Blue Team Defense, CrackMapExec Alternative, Credential Spraying, Lateral Movement, Netexec, Network Discovery, NTLM Authentication, Pass-the-Hash (PTH), Pass-the-Ticket (PTT), SMB Enumeration

Getting Started with NetExec: Streamlining Network Discovery and Access

One tool that I can’t live without when performing a penetration test in an Active Directory environment is called NetExec. Being able to efficiently authenticate against multiple systems in the network is crucial, and NetExec is an incredibly powerful tool that helps automate a lot of this activity.

Read the entire post here
«‹ 4 5 6 7›»

Looking For Something?

Browse by category

Recent Posts

  • How To Lead Effective Cybersecurity TabletopsHow to Lead Effective Tabletops
    Learn how to transform boring, meeting-style security
  • grc_header (1)Understanding GRC: How to Navigate Risks and Compliance Standards
    “GRC” isn’t all witchcraft and administrative
  • Linux Persistence For PentestersThe “P” in PAM is for Persistence: Linux Persistence Technique
    Learn about a pentesting tool using the Pluggable

Browse by topic

Active Directory ADHD AI anti-virus Attack Tactics AV Beau Bullock BHIS Blue Team C2 Carrie Roberts cloud Cyber Deception hacking infosec Infosec for Beginners InfoSec Survival Guide Joff Thyer john strand Jordan Drysdale Kent Ickler Kerberos Linux MailSniper Malware Microsoft Nessus Nmap passwords password spraying pen-testing penetration testing pentest Pentesting phishing PowerShell Python Red Team red teaming RITA Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security, Inc.

890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008


About Us | BHIS Tribe of Companies | Privacy Policy | Contact

Links
Search the site