Black Hills Information Security, Inc.
RSS
  • All Services
    • Complete Service Guide
    • Active SOC
    • AI Security Assessments
    • Blockchain Security
    • Blue Team Services
    • Continuous Penetration Testing
    • High-Profile Risk Assessments
    • Incident Response
    • Penetration Testing
  • Contact Us
    • Contact Us
    • Email Sign-Up
  • About Us
    • Security Consultants
    • Admin
    • SOC Team
    • Antisyphon Training
    • BHIS Family of Companies
  • Free Resources
    • Blogs
    • Free Cybersecurity Tools
    • Free Cybersecurity Webcasts
    • Podcasts
    • RITA
  • Training
    • BHIS & Antisyphon Training
    • WWHF Conference
  • Online Community
    • Discord
    • LinkedIn
    • YouTube
    • Bluesky
    • Twitter/X
    • Upcoming Events
  • Fun Stuff
    • Backdoors & Breaches
    • Merch, Zines & More
    • PROMPT# Zine
    • REKCAH
    • Books
how to set up home wifi

Ethan Robish, How-To, InfoSec 201 Cisco, guest networks, home network, home networking, how to set up your home wifi, how to set up your internet at home, Routers, wi-fi

Home Network Design – Part 1

Ethan Robish // In this series of posts, I’ll discuss how I segmented my home network using VLANs and how I moved away from using a risky consumer-grade router at […]

Read the entire post here
Debating the Active Defense Law.. Because Arguing is Fun

Author, Blue Team, John Strand Active Defense, ADHD, Arguing is Fun, Debates, Law, No Debate is Finished Until Hitler Is Mentioned

Debating the Active Defense Law.. Because Arguing is Fun

John Strand // I wanted to take a few moments and address the ā€œHacking Backā€ law that is working people up. There is a tremendously well-founded fear that this law […]

Read the entire post here
00249_11082017_WEBCAST_JavaScriptWeaponized

Red Team, Webcasts JavaScript, webcast

WEBCAST: JavaScript Weaponized

Matthew Toussain // PowerShell is dead… well dying, kind of. JavaScript interpreters, on the other hand, are everywhere, and they are far from confined to the web browser. Join Matt […]

Read the entire post here
DCS_7920

Fun & Games Wild West Hackin' Fest, WWHF, WWHF Lab, WWHF Speakers

Stargazing at Wild West Hackin’ Fest

Gail Menius// The sky is clear, the air is so cool and crisp with the small dusting of snow muting the sounds of Deadwood you can almost hear the stars […]

Read the entire post here
00247_11012017_GoogleCalendarEventInjectionMailSniper

Author, Beau Bullock, Mike Felch, Red Team, Red Team Tools Event Injection, G Suite, Google, Google Calendar

Google Calendar Event Injection with MailSniper

Beau Bullock & Michael Felch // Source: https://chrome.google.com/webstore/detail/google-calendar-by-google/gmbgaklkmjakoegficnlkhebmhkjfich Overview Google Calendar is one of the many features provided to those who sign up for a Google account along with other popular […]

Read the entire post here

Blue Team, Webcasts

WEBCAST: How to Guide Your Company to Test its POC

Lidia Giuliano//* The endpoint protection space is a hot market. With statistics showing malware creation ranging from 300,000 to a million pieces a day, traditional signatures just can’t keep up. […]

Read the entire post here
Empire Resource Files and Auto Runs

Red Team, Red Team Tools automating commands, Empire, Empire Project, Listeners, PowerShel commands, PowerShell, PowerShell Empire

Empire Resource Files and Auto Runs

Carrie Roberts* // I have added resource file and autorun functionality to PowerShell Empire. Empire now has the ability to run multiple commands at once by specifying the commands in […]

Read the entire post here
grep

Red Team, Red Team Tools Grep, PowerShell, PowerView

Grepping Through PowerView Output

Carrie Roberts//* Have you found yourself trying to Grep through PowerView output, or any PowerShell output for that matter, and find that it returns no results for text you know […]

Read the entire post here
john square

Author, InfoSec 101, John Strand, Webcasts Arizona Cyber Warfare Range, BHIS Webcast World Tour, webcast

WEBCAST: BHIS Webcast World Tour – Live from AZ

John Strand// As part of the BHIS Webcast World Tour, we held a live event at the newly opened Arizona Cyber Warfare Range (AZCWR) in Phoenix AZ. To read about and […]

Read the entire post here
«‹ 52 53 54 55›»

Looking For Something?

Browse by category

Recent Posts

  • smart goals_header (1)How to Set Smart Goals (That Actually Work For You)
    Setting goals is a deceptively simple career skill we
  • socinterview_headerInside the BHIS SOC: A Conversation with Hayden CovingtonĀ 
    What happens when you ditch the tiered ticket queues
  • del3_headerAbusing Delegation with Impacket (Part 3): Resource-Based Constrained Delegation
    This is the third in a three-part series of blog posts

Browse by topic

Active Directory ADHD AI anti-virus Attack Tactics AV Beau Bullock BHIS Blue Team C2 Carrie Roberts cloud Cyber Deception hacking Hashcat infosec Infosec for Beginners InfoSec Survival Guide Joff Thyer john strand Jordan Drysdale Kent Ickler Kerberos Linux MailSniper Microsoft Nessus Nmap passwords password spraying pen-testing penetration testing pentest Pentesting phishing PowerShell Python Red Team red teaming RITA Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security, Inc.

890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008


About Us | BHIS Tribe of Companies | Privacy Policy | Contact

Links
Search the site