Black Hills Information Security, Inc.
RSS
  • All Services
    • Complete Service Guide
    • Active SOC
    • AI Security Assessments
    • Blockchain Security
    • Blue Team Services
    • Continuous Penetration Testing
    • High-Profile Risk Assessments
    • Incident Response
    • Penetration Testing
  • Contact Us
    • Contact Us
    • Email Sign-Up
  • About Us
    • Security Consultants
    • Admin
    • SOC Team
    • Antisyphon Training
    • BHIS Tribe of Companies
  • Free Resources
    • Blogs
    • Free Cybersecurity Tools
    • Free Cybersecurity Webcasts
    • Podcasts
    • RITA
  • Training
    • BHIS & Antisyphon Training
    • WWHF Conference
  • Community
    • Discord
    • LinkedIn
    • YouTube
    • Bluesky
    • Twitter/X
    • Upcoming Events
  • Fun Stuff
    • Backdoors & Breaches
    • Merch, Zines & More
    • PROMPT# Zine
    • REKCAH
    • Books
featured

Author, CJ Cox, InfoSec 101, Webcasts General Questions, pen-testing, preparing for a pen test, webcast

WEBCAST: Preparing Yourself & Your Company for a First Pen-test

CJ Cox// Are you about to have your first pen test? It can be a little overwhelming as a lot of people are sure they’re going to be destroyed in […]

Read the entire post here
00239_10042017_WEBCAST_CredDefenseToolkit

Author, Beau Bullock, Blue Team, Blue Team Tools, Webcasts CredDefense, defense, defensive tool, Pentesting, tool, toolkit

WEBCAST: CredDefense Toolkit

Beau Bullock, Brian Fehrman, & Derek Banks // Pentesting organizations as your day-to-day job quickly reveals commonalities among environments. Although each test is a bit unique, there’s a typical path […]

Read the entire post here
00238_10022017_HowToCrackPasswords

How-To, Password Cracking, Red Team, Red Team Tools Carrie Roberts, Hashcat, John the Ripper, MS Office, password, password protected MS Office document, Red Team, rockyou

How to Crack Passwords for Password Protected MS Office Documents

Carrie Roberts* // (Updated, 2/11/2019) Trying to figure out the password for a password protected MS Office document? This free solution might do the trick. It attempts to guess the password […]

Read the entire post here
End-Point Log Consolidation with Windows Event Forwarder

Author, Blue Team, Blue Team Tools, Derek Banks CredDefense, CredDefense Toolkid, End Point Log Consolidation, HoneyToken, kerberoasting, Pentesting, tool, WEF, Windows, Windows Event Forwarder

End-Point Log Consolidation with Windows Event Forwarder

Derek Banks // I want to expand on our previous blog post on consolidated endpoint event logging and use Windows Event Forwarding and live off the Microsoft land for shipping […]

Read the entire post here
00236_09272017_CredDefenseToolkit

Author, Beau Bullock, Blue Team, Blue Team Tools, Brian Fehrman Cred Defense Tool Kit, CredDefense, CredDefense Toolkit, event log consolidation, hardening accounts, kerberoasting, password auditing, password spraying, Pentesting, ResponderGuard

The CredDefense Toolkit

Derek Banks, Beau Bullock, & Brian Fehrman // Our clients often ask how they could have detected and prevented the post-exploitation activities we used in their environment to gain elevated […]

Read the entire post here
active dad in studio title

Author, Blue Team, Blue Team Tools, John Strand, Webcasts Active DAD, Active Defense Harbinger Distribution, Active Directory Active Defense, ADAD, ADHD, honey accounts

WEBCAST: Active Domain Active Defense (Active DAD) Primer with John Strand

This is the in-studio version of our live in DC event from July. In this webcast, John covers how to set up Active Directory Active Defense (ADAD) using tools in […]

Read the entire post here
information-security-you-keep-using-that-word-i-do-not-think-it-means-what-you-think-it-means

InfoSec 101 Executive Leadership Team, Industry, infosec, security

Five Signs Your Organization Is Failing at Security

@1iJax aka The Security Viking// Just when you think the drum has been beaten loudly enough for long enough, a quick survey of organizations across the spectrum will find many […]

Read the entire post here
tracking

Blue Team, Hunt Teaming Bro IDS, dnscat2, How to, meterpreter, PowerShell Empire, RITA

Let’s Go Hunting! How to Hunt Command & Control Channels Using Bro IDS and RITA

Logan Lembke// Here at BHIS, we ♥ Bro IDS. Imagine… Bro IDS Everywhere! If you haven’t encountered Bro IDS before, checkout this webcast on John’s Youtube channel discussing the need for Bro […]

Read the entire post here
video

Author, David Fletcher, Webcasts Demo, RF Attacks, webcast, Wild West Hackin' Fest, WWHF Lab

WEBCAST- WWHF Lab Exploration: Hands-on RF Attacks

David Fletcher// Join David as he takes a look at one of the many labs that we’ll be offering during Wild West Hackin’ Fest. This lab explores signal analysis and […]

Read the entire post here
«‹ 54 55 56 57›»

Looking For Something?

Browse by category

Recent Posts

  • homelab_headerWhat to Do with Your First Home Lab
    Having assembled fundamental lab components, you now
  • deadwood_headerWhen the SOC Goes to Deadwood: A Night to Remember 
    Hear a tale about the time the BHIS SOC team conducted
  • Social Engineering and Microsoft SSPRSocial Engineering and Microsoft SSPR: The Road to Pwnage is Paved with Good Intentions 
    This scenario simultaneously tests identity

Browse by topic

Active Directory ADHD AI anti-virus Attack Tactics AV Beau Bullock BHIS Blue Team C2 Carrie Roberts cloud Cyber Deception hacking Hashcat infosec Infosec for Beginners InfoSec Survival Guide Joff Thyer john strand Jordan Drysdale Kent Ickler Kerberos Linux MailSniper Microsoft Nessus Nmap passwords password spraying pen-testing penetration testing pentest Pentesting phishing PowerShell Python Red Team red teaming RITA Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security, Inc.

890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008


About Us | BHIS Tribe of Companies | Privacy Policy | Contact

Links
Search the site