Black Hills Information Security, Inc.
RSS
  • All Services
    • Complete Service Guide
    • Active SOC
    • AI Security Assessments
    • Blockchain Security
    • Blue Team Services
    • Continuous Penetration Testing
    • High-Profile Risk Assessments
    • Incident Response
    • Penetration Testing
  • Contact Us
    • Contact Us
    • Email Sign-Up
  • About Us
    • Security Consultants
    • Admin
    • SOC Team
    • Antisyphon Training
    • BHIS Family of Companies
  • Free Resources
    • Blogs
    • Free Cybersecurity Tools
    • Free Cybersecurity Webcasts
    • Podcasts
    • RITA
  • Training
    • BHIS & Antisyphon Training
    • WWHF Conference
  • Online Community
    • Discord
    • LinkedIn
    • YouTube
    • Bluesky
    • Twitter/X
    • Upcoming Events
  • Fun Stuff
    • Backdoors & Breaches
    • Merch, Zines & More
    • PROMPT# Zine
    • REKCAH
    • Books
PSX_20171010_145956

Author, Fun & Games, John Strand Arizona Cyber Warfare Range, Community, Education, Webcast World Tour

Webcast World Tour: Arizona Cyber Warfare Range

This week we went down to Phoenix Arizona where we teamed up with the Arizona Cyber Warfare Range (AZCWR) for a great event at Grand Canyon University! Black Hills Information […]

Read the entire post here
00241_10122017_AreYouReallyHackingNaked

Author, How-To, InfoSec 301, Joff Thyer MASSCAN, Technical

Are You Really Hacking Naked?

Joff Thyer // I had an interesting experience recently that reminded me to always ā€œtrust but verify.ā€ Let me set the stage for you. As a penetration tester, and IT […]

Read the entire post here
featured

Author, CJ Cox, InfoSec 101, Webcasts General Questions, pen-testing, preparing for a pen test, webcast

WEBCAST: Preparing Yourself & Your Company for a First Pen-test

CJ Cox// Are you about to have your first pen test? It can be a little overwhelming as a lot of people are sure they’re going to be destroyed in […]

Read the entire post here
00239_10042017_WEBCAST_CredDefenseToolkit

Author, Beau Bullock, Blue Team, Blue Team Tools, Webcasts CredDefense, defense, defensive tool, Pentesting, tool, toolkit

WEBCAST: CredDefense Toolkit

Beau Bullock, Brian Fehrman, & Derek Banks // Pentesting organizations as your day-to-day job quickly reveals commonalities among environments. Although each test is a bit unique, there’s a typical path […]

Read the entire post here
00238_10022017_HowToCrackPasswords

How-To, Password Cracking, Red Team, Red Team Tools Carrie Roberts, Hashcat, John the Ripper, MS Office, password, password protected MS Office document, Red Team, rockyou

How to Crack Passwords for Password Protected MS Office Documents

Carrie Roberts* // (Updated, 2/11/2019) Trying to figure out the password for a password protected MS Office document? This free solution might do the trick. It attempts to guess the password […]

Read the entire post here
End-Point Log Consolidation with Windows Event Forwarder

Author, Blue Team, Blue Team Tools, Derek Banks CredDefense, CredDefense Toolkid, End Point Log Consolidation, HoneyToken, kerberoasting, Pentesting, tool, WEF, Windows, Windows Event Forwarder

End-Point Log Consolidation with Windows Event Forwarder

Derek Banks // I want to expand on our previous blog post on consolidated endpoint event logging and use Windows Event Forwarding and live off the Microsoft land for shipping […]

Read the entire post here
00236_09272017_CredDefenseToolkit

Author, Beau Bullock, Blue Team, Blue Team Tools, Brian Fehrman Cred Defense Tool Kit, CredDefense, CredDefense Toolkit, event log consolidation, hardening accounts, kerberoasting, password auditing, password spraying, Pentesting, ResponderGuard

The CredDefense Toolkit

Derek Banks, Beau Bullock, & Brian Fehrman // Our clients often ask how they could have detected and prevented the post-exploitation activities we used in their environment to gain elevated […]

Read the entire post here
active dad in studio title

Author, Blue Team, Blue Team Tools, John Strand, Webcasts Active DAD, Active Defense Harbinger Distribution, Active Directory Active Defense, ADAD, ADHD, honey accounts

WEBCAST: Active Domain Active Defense (Active DAD) Primer with John Strand

This is the in-studio version of our live in DC event from July. In this webcast, John covers how to set up Active Directory Active Defense (ADAD) using tools in […]

Read the entire post here
information-security-you-keep-using-that-word-i-do-not-think-it-means-what-you-think-it-means

InfoSec 101 Executive Leadership Team, Industry, infosec, security

Five Signs Your Organization Is Failing at Security

@1iJax aka The Security Viking// Just when you think the drum has been beaten loudly enough for long enough, a quick survey of organizations across the spectrum will find many […]

Read the entire post here
«‹ 53 54 55 56›»

Looking For Something?

Browse by category

Recent Posts

  • smart goals_header (1)How to Set Smart Goals (That Actually Work For You)
    Setting goals is a deceptively simple career skill we
  • socinterview_headerInside the BHIS SOC: A Conversation with Hayden CovingtonĀ 
    What happens when you ditch the tiered ticket queues
  • del3_headerAbusing Delegation with Impacket (Part 3): Resource-Based Constrained Delegation
    This is the third in a three-part series of blog posts

Browse by topic

Active Directory ADHD AI anti-virus Attack Tactics AV Beau Bullock BHIS Blue Team C2 Carrie Roberts cloud Cyber Deception hacking Hashcat infosec Infosec for Beginners InfoSec Survival Guide Joff Thyer john strand Jordan Drysdale Kent Ickler Kerberos Linux MailSniper Microsoft Nessus Nmap passwords password spraying pen-testing penetration testing pentest Pentesting phishing PowerShell Python Red Team red teaming RITA Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security, Inc.

890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008


About Us | BHIS Tribe of Companies | Privacy Policy | Contact

Links
Search the site