Black Hills Information Security
Weekly infosec news podcast with the pen testers and friends of Black Hills Information Security.
RSS
  • About Us
    • Testers
    • Admin
    • SOC/HTOC Team
    • Partners
    • Interns
    • BHIS Tribe of Companies
  • Contact
    • Contact Us
    • Email Sign-Up
  • Services
    • Active SOC
    • Blockchain Security
    • Blue Team Services
    • High-Profile Risk Assessments
    • Hunt Teaming (HTOC)
    • Incident Response
    • Penetration Testing
  • Projects/Tools
    • All Tools
    • RITA
    • Books
    • REKCAH
  • Learn
    • Backdoors & Breaches
    • Blog
    • Conference
    • Podcasts
    • PROMPT# Zine
    • Upcoming Events
    • Webcasts
  • Community
    • Discord
    • LinkedIn
    • T-Shirts & Hoodies
    • Twitter
    • YouTube
  • Training

Author, Brian King, InfoSec 201 browser plug-ins, browsers, privacy, security, they're watching, wappalyzer

Browser Plugin Oversharing

Brian King //   Do you know what that browser plugin is doing? There’s a browser plugin for just about everything. You can find one to change the name of […]

Read the entire post here

00061_05102016_AdvancedMsfvenomPayloadGeneration2

Author, Joff Thyer, Red Team KALI, payload generation, PEInsider, PowerShell, shellcode

Advanced Msfvenom Payload Generation

Joff Thyer // It has been known for some time that an executable payload generated with msfvenom can leverage an alternative template EXE file, and be encoded to better evade […]

Read the entire post here

15 Ways to Be a Safer Computer User

General InfoSec Tips & Tricks, InfoSec 101 basic stuff, dark alleys, internet safety, listicles, safe computer usage, tips for your mom, your mom

15 Ways to Be a Safer Computer User

Sierra Ward // Editor’s note: Though infosec professionals may see this advice as basic to the point of being obvious, as we visit with people and interact with swaths of other […]

Read the entire post here

Author, Blue Team, Blue Team Tools, Jordan Drysdale ansible, Config management, CSC #2, lazy admin

Ansible for Lazy Admins

Jordan Drysdale // For the lazy server and system admins, automating those boring functions of updating packages, finding outdated ones, checking scans, et cetera, Ansible has some very nice features. […]

Read the entire post here

Mailvelope_mail_locked_icon.svg

General InfoSec Tips & Tricks, InfoSec 201 encrypted email, encryption, gpg, mailvelope, passphrase, pgp codes, thunderbird

5 Reasons for Mailvelope & Easy Instructions

Gail Menius // My husband set me up with GPG and Thunderbird and it was too hard. Ethan said it was cool. Lots of people gave it good reviews. It’s […]

Read the entire post here

Author, David Fletcher, External/Internal, Red Team cool stuff, shell script, SSL, testssl.sh, TLS, tools

TestSSL.sh –Assessing SSL/TLS Configurations at Scale

David Fletcher // Have you ever looked at Nessus scan results to find the below in the output? Recently I was on engagement and encountered just this situation.  I found […]

Read the entire post here

00056_04252016_InternalPivotNetwork2

Author, External/Internal, Joff Thyer, Red Team C2, internal pentest, ipconfig, ipconfig Output, l33t ninja, metasploit, pen-testing, Pentesting

Internal Pivot, Network Enumeration, & Lateral Movement

Joff Thyer // Picture a scenario whereby you are involved in an internal network penetration test. Perhaps you have succeeded with a spear-phishing campaign and landed on an internal system, […]

Read the entire post here

Author, Ethan Robish, Fun & Games college, get to know a tester, internship, interview, my mom got me a job

Get to Know a Tester: Ethan Robish

Sierra Ward & Ethan Robish // Intro by Ethan: Sierra came up with the idea to interview me for this blog.  I thought it was a great idea and after watching Rick […]

Read the entire post here

00054_04202016_HowToBypassApplicationWhitelisting(2)

Author, Brian Fehrman, Red Team anti-virus, bypassing AV, Kill your AV, whitelisting

How to Bypass Application Whitelisting & AV

Brian Fehrman // There are numerous methods that have been published to bypass Anti-Virus products. As a result, many companies are beginning to realize that application whitelisting is another tool […]

Read the entire post here

«‹ 56 57 58 59›»

Follow Us

Looking For Something?

Browse by category

Recent Posts

  • How Attackers Use SSH.exe as a Backdoor Into Your NetworkSsh… Don’t Tell Them I Am Not HTTPS: How Attackers Use SSH.exe as a Backdoor Into Your Network
    Derek Banks // Living Off the Land Binaries, Scripts,
  • Talkin’ About Infosec News – 3/16/2023
    00:00 – PreShow Banter™ — Tossing Money at
  • Your Browser is Not a Safe SpaceYour Browser is Not a Safe Space
    Corey Ham // Tl;dr   Use a password manager

Browse by topic

Active Directory ADHD anti-virus Attack Tactics AV Beau Bullock Blue Team bypassing AV C2 Carrie Roberts command and control hacking hardware hacking Hashcat infosec Joff Thyer john strand Jordan Drysdale Kent Ickler Linux MailSniper Malware Microsoft Nessus password policy passwords password spraying pen-testing penetration testing pentest Pentesting phishing podcast PowerShell Python Raymond Felch Red Team red teaming RITA social engineering Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security

115 W. Hudson St. Spearfish, SD 57783 | 701-484-BHIS
© 2008

Links
Search the site