Black Hills Information Security, Inc.
RSS
  • All Services
    • Complete Service Guide
    • Active SOC
    • AI Security Assessments
    • Blockchain Security
    • Blue Team Services
    • Continuous Penetration Testing
    • High-Profile Risk Assessments
    • Incident Response
    • Penetration Testing
  • Contact Us
    • Contact Us
    • Email Sign-Up
  • About Us
    • Security Consultants
    • Admin Team
    • Active SOC Team
    • Antisyphon Training
    • BHIS Tribe of Companies
  • Free Resources
    • Blogs
    • Free Cybersecurity Tools
    • Free Cybersecurity Webcasts
    • Podcasts
    • RITA
  • Training
    • BHIS & Antisyphon Training
    • WWHF Conference
  • Community
    • Discord
    • LinkedIn
    • YouTube
    • Bluesky
    • Twitter/X
    • Upcoming Events
  • Fun Stuff
    • Backdoors & Breaches
    • Merch, Zines & More
    • PROMPT# Zine
    • REKCAH
    • Books
00263_01082018_AnalyzingExtensionEffectivenessWithBurp

Author, InfoSec 201, Jordan Drysdale Ad block extensions, AdBlock Plus, Burp, Ghostery, Jordan Drysdale, uBlock Origin

Analyzing Extension Effectiveness with Burp

Jordan Drysdale // tl;dr uBlock Origin appears, based on non-scientific testing, to be fairly effective at keeping trackers from making outbound HTTP GET requests. Tested Extensions: No Add-ons v Ghostery […]

Read the entire post here
00262_01032018_BusinessSecurityStrategiesPart2(2)

Author, How-To, InfoSec 201, Jordan Drysdale it security, Jordan Drysdale, Small Business, SMB InfoSec Controls

Small and Medium Business Security Strategies: Part 2

Jordan Drysdale // A few of us have discussed the stress that small and medium business proprietors and operators feel these days. We want to help stress you out even […]

Read the entire post here
A Holiday Tale of Two Teams: The Blue Team Barbie & Red Team Elf on the Shelf saga

Fun & Games Blue Team, Blue Team Barbie, Christmas Toys, Elf on the Shelf, fun and games, infosec, Red Team, Red Team Elf on the Shelf

A Holiday Tale of Two Teams: The Blue Team Barbie & Red Team Elf on the Shelf saga

Staff // Thanks to everyone for all the good ideas! We had so much fun with this, and hopefully it made you laugh as much as we did. Happy December! […]

Read the entire post here
Macro shot of twenty sided dice with other dice

Author, Blue Team, John Strand Cubicles and Compromises, Dungeons and Dragons, Incident Response, Table Top

Dungeons & Dragons, Meet Cubicles & Compromises

John Strand //   Lately we’ve been running a very cool game with a few of our customers. There’s been some demand for incident response table top exercises. For the […]

Read the entire post here
00259_12202017_BusinessSecurityStrategiesPart1(2)

Author, Blue Team, How-To, Jordan Drysdale Critical Controls, it security, Jordan Drysdale, Small Business, Small Business Security

Small and Medium Business Security Strategies: Part 1

Jordan Drysdale// Blurb: A few of us have discussed the stress that small and medium business proprietors and operators feel these days. We want to help stress you out even […]

Read the entire post here
there and back square

Red Team, Red Team Tools, Webcasts BurpSuite, ZAP

WEBCAST: There and Back Again – A Pathfinder’s Tale

Matthew Toussain// Portswigger’s Burpsuite has become the tool of choice for web application penetration testers. OWASP’s Zed Attack Proxy (ZAP) not only fights in the same weight class but also […]

Read the entire post here
00257_12132017_PerformingPhysicalPentest

Author, Jordan Drysdale, Physical, Red Team Badgy, Jordan Drysdale, pen-testing, penetration testing, pentest, Pentesting, Physical Pentest

Performing a Physical Pentest? Bring This!

Jordan Drysdale// Physical Pentest Upcoming? Bring a Badgy. While badge reproduction may not be the intended use of this product, if you are a physical tester and you don’t own […]

Read the entire post here
00256_12062017_DiggingIntoVulnerableWindowsServices

Author, Brian Fehrman, External/Internal, Red Team Application Whitelisting, escalated, penetration testing, Pentesting, privilege escalation, whitelisting, Windows, Windows Privilege Escalation

Digging Deeper into Vulnerable Windows Services

Brian Fehrman // Privilege escalation is a common goal for threat actors after they have compromised a system. Having elevated permissions can allow for tasks such as: extracting local password-hashes, […]

Read the entire post here
00255_12042017_MorningWithCobaltStrikeSymantec

Author, C2, Joff Thyer, Red Team anti-virus, AV software, C2, easy button, pen-testing, penetration testing, pentest, Pentesting, Symantec, There is NO easy button

A Morning with Cobalt Strike & Symantec

Joff Thyer // If you have been penetration testing a while, you likely have ended up in a Red Team situation or will be engaged in it soon enough. From […]

Read the entire post here
«‹ 52 53 54 55›»

Looking For Something?

Browse by category

Recent Posts

  • How To Lead Effective Cybersecurity TabletopsHow to Lead Effective Tabletops
    Learn how to transform boring, meeting-style security
  • grc_header (1)Understanding GRC: How to Navigate Risks and Compliance Standards
    “GRC” isn’t all witchcraft and administrative
  • Linux Persistence For PentestersThe “P” in PAM is for Persistence: Linux Persistence Technique
    Learn about a pentesting tool using the Pluggable

Browse by topic

Active Directory ADHD AI anti-virus Attack Tactics AV Beau Bullock BHIS Blue Team C2 Carrie Roberts cloud Cyber Deception hacking infosec Infosec for Beginners InfoSec Survival Guide Joff Thyer john strand Jordan Drysdale Kent Ickler Kerberos Linux MailSniper Malware Microsoft Nessus Nmap passwords password spraying pen-testing penetration testing pentest Pentesting phishing PowerShell Python Red Team red teaming RITA Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security, Inc.

890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008


About Us | BHIS Tribe of Companies | Privacy Policy | Contact

Links
Search the site