Black Hills Information Security, Inc.
RSS
  • All Services
    • Complete Service Guide
    • Active SOC
    • AI Security Assessments
    • Blockchain Security
    • Blue Team Services
    • Continuous Penetration Testing
    • High-Profile Risk Assessments
    • Incident Response
    • Penetration Testing
  • Contact Us
    • Contact Us
    • Email Sign-Up
  • About Us
    • Security Consultants
    • Admin
    • ActiveSOC Team
    • Antisyphon Training
    • BHIS Tribe of Companies
  • Free Resources
    • Blogs
    • Free Cybersecurity Tools
    • Free Cybersecurity Webcasts
    • Podcasts
    • RITA
  • Training
    • BHIS & Antisyphon Training
    • WWHF Conference
  • Community
    • Discord
    • LinkedIn
    • YouTube
    • Bluesky
    • Twitter/X
    • Upcoming Events
  • Fun Stuff
    • Backdoors & Breaches
    • Merch, Zines & More
    • PROMPT# Zine
    • REKCAH
    • Books
00236_09272017_CredDefenseToolkit

Author, Beau Bullock, Blue Team, Blue Team Tools, Brian Fehrman Cred Defense Tool Kit, CredDefense, CredDefense Toolkit, event log consolidation, hardening accounts, kerberoasting, password auditing, password spraying, Pentesting, ResponderGuard

The CredDefense Toolkit

Derek Banks, Beau Bullock, & Brian Fehrman // Our clients often ask how they could have detected and prevented the post-exploitation activities we used in their environment to gain elevated […]

Read the entire post here
active dad in studio title

Author, Blue Team, Blue Team Tools, John Strand, Webcasts Active DAD, Active Defense Harbinger Distribution, Active Directory Active Defense, ADAD, ADHD, honey accounts

WEBCAST: Active Domain Active Defense (Active DAD) Primer with John Strand

This is the in-studio version of our live in DC event from July. In this webcast, John covers how to set up Active Directory Active Defense (ADAD) using tools in […]

Read the entire post here
information-security-you-keep-using-that-word-i-do-not-think-it-means-what-you-think-it-means

InfoSec 101 Executive Leadership Team, Industry, infosec, security

Five Signs Your Organization Is Failing at Security

@1iJax aka The Security Viking// Just when you think the drum has been beaten loudly enough for long enough, a quick survey of organizations across the spectrum will find many […]

Read the entire post here
tracking

Blue Team, Hunt Teaming Bro IDS, dnscat2, How to, meterpreter, PowerShell Empire, RITA

Let’s Go Hunting! How to Hunt Command & Control Channels Using Bro IDS and RITA

Logan Lembke// Here at BHIS, we ♥ Bro IDS. Imagine… Bro IDS Everywhere! If you haven’t encountered Bro IDS before, checkout this webcast on John’s Youtube channel discussing the need for Bro […]

Read the entire post here
video

Author, David Fletcher, Webcasts Demo, RF Attacks, webcast, Wild West Hackin' Fest, WWHF Lab

WEBCAST- WWHF Lab Exploration: Hands-on RF Attacks

David Fletcher// Join David as he takes a look at one of the many labs that we’ll be offering during Wild West Hackin’ Fest. This lab explores signal analysis and […]

Read the entire post here
image poster

Author, Fun & Games, John Strand Arizona, Cyber Warfare Range, Event, SANS Mesa, webcast

Upcoming Event in Arizona

John Strand// Hello all in Arizona! Just wanted to let you know that I am coming down for SANS Mesa: https://www.sans.org/event/phoenix-mesa-2017/course/hacker-techniques-exploits-incident-handling And, I will be doing an evening talk at […]

Read the entire post here
data

Author, InfoSec 201, Jordan Drysdale data, Data Brokers, Digital Identity, privacy

Review of the Data Brokers

Jordan Drysdale // The following content is loosely based on a presentation I gave at BSides Denver. After speaking at BSides Denver, one of the audience members spent some time […]

Read the entire post here
ford

Author, David Fletcher, InfoSec 201 2016 Ford Flex, Internet of Things, IoT, updates, wi-fi

Internet of Things Exploration: 2016 Ford Flex

David Fletcher// My wife and I recently purchased a 2016 Ford Flex to replace an aging version of the same make and model that met an untimely fate. During the […]

Read the entire post here
pasted image 0 (1)

Author, David Fletcher, How-To, InfoSec 301 AP, Soft Access Point, software access point, Ubuntu, Ubuntu 16.04

How to Build a Soft Access Point in Ubuntu 16.04

David Fletcher// This blog post is going to illustrate setting up a software access point (AP) on Ubuntu 16.04.  Having the ability to create a software AP can be very […]

Read the entire post here
«‹ 55 56 57 58›»

Looking For Something?

Browse by category

Recent Posts

  • How To Lead Effective Cybersecurity TabletopsHow to Lead Effective Tabletops
    Learn how to transform boring, meeting-style security
  • grc_header (1)Understanding GRC: How to Navigate Risks and Compliance Standards
    “GRC” isn’t all witchcraft and administrative
  • Linux Persistence For PentestersThe “P” in PAM is for Persistence: Linux Persistence Technique
    Learn about a pentesting tool using the Pluggable

Browse by topic

Active Directory ADHD AI anti-virus Attack Tactics AV Beau Bullock BHIS Blue Team C2 Carrie Roberts cloud Cyber Deception hacking infosec Infosec for Beginners InfoSec Survival Guide Joff Thyer john strand Jordan Drysdale Kent Ickler Kerberos Linux MailSniper Malware Microsoft Nessus Nmap passwords password spraying pen-testing penetration testing pentest Pentesting phishing PowerShell Python Red Team red teaming RITA Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security, Inc.

890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008


About Us | BHIS Tribe of Companies | Privacy Policy | Contact

Links
Search the site