Black Hills Information Security, Inc.
RSS
  • All Services
    • Complete Service Guide
    • Active SOC
    • AI Security Assessments
    • Blockchain Security
    • Blue Team Services
    • Continuous Penetration Testing
    • High-Profile Risk Assessments
    • Incident Response
    • Penetration Testing
  • Contact Us
    • Contact Us
    • Email Sign-Up
  • About Us
    • Security Consultants
    • Admin
    • SOC Team
    • Antisyphon Training
    • BHIS Family of Companies
  • Free Resources
    • Blogs
    • Free Cybersecurity Tools
    • Free Cybersecurity Webcasts
    • Podcasts
    • RITA
  • Training
    • BHIS & Antisyphon Training
    • WWHF Conference
  • Online Community
    • Discord
    • LinkedIn
    • YouTube
    • Bluesky
    • Twitter/X
    • Upcoming Events
  • Fun Stuff
    • Backdoors & Breaches
    • Merch, Zines & More
    • PROMPT# Zine
    • REKCAH
    • Books
firefox

Author, Brian King, General InfoSec Tips & Tricks, InfoSec 201 Firefox, Firefox extentions, HTTP, penetreation testing, Pentesting, quieter Firefox, tool, webapp test

Towards a Quieter Firefox

Brian King // On a recent webapp test, I got a little frustrated with all the extra HTTP requests showing up in my Burpsuite Proxy History from connections that Firefox […]

Read the entire post here
How to Identify Network Vulnerabilities with NetworkRecon.ps1

Author, David Fletcher, External/Internal, Red Team, Red Team Tools network traffic, Network Vulnerabilities, NetworkRecon.ps1, tools

How to Identify Network Vulnerabilities with NetworkRecon.ps1

David Fletcher //   Whenever I have the opportunity, I like to perform packet collection on a test for about five minutes so I can analyze the results and look […]

Read the entire post here
AP2

Phishing, Red Team, Red Team Tools macros, MS Excel, MS Office, MS Word, Risky Business

How to Get Malicious Macros Past Email Filters

Carrie Roberts //       A malicious macro in a Microsoft Word or Excel document is an effective hacking technique. These documents could be delivered in a variety of […]

Read the entire post here
00203_05152017_DomainGoodness-1

Author, External/Internal, Red Team, Red Team Tools, Sally Vandeven AD Explorer, DA, domain admin, Pentesting, Shodan

Domain Goodness – How I Learned to LOVE AD Explorer

Sally Vandeven // OR How to Pentest with AD Explorer! Mark Russinovich’s Sysinternals tools (Microsoft) are nothing new. They have been a favorite among system administrators for many, many years. […]

Read the entire post here

Author, Joff Thyer, Red Team, Red Team Tools, Webcasts Blue Team, how to analyze log frequency with python, log analysis, Log File Frequency Analysis, Python, Red Team

WEBCAST: Log File Frequency Analysis with Python

Joff Thyer // Information Security professionals often have reason to analyze logs. Whether Red Team or Blue Team, there are countless times that you find yourself using “grep”, “tail”, “cut”, […]

Read the entire post here
00201_05102017_EvadeApplicationWhitelisting

Author, External/Internal, Joff Thyer, Red Team, Red Team Tools Casey Smith, COM+ scriplets, DLL, subtee, Wevade, whitelisting

How to Evade Application Whitelisting Using REGSVR32

Joff Thyer // I was recently working on a Red Team for a customer that was very much up to date with their defenses. This customer had tight egress controls, […]

Read the entire post here
00200_05102017_ToastToKerberoast

Author, Derek Banks, External/Internal, Red Team kerberoasting, Kerberos

A Toast to Kerberoast

Derek Banks // This post will walk through a technique to remotely run a Kerberoast attack over an established Meterpreter session to an Internet-based Ubuntu 16.04 C2 server and crack […]

Read the entire post here
k and j 1

Author, How-To, Jordan Drysdale, Kent Ickler, Webcasts, Wireless attack-n-crack, how to attack wi-fi, how to set up wi-fi, webcasts, wi-fi

WEBCAST: Attack-n-Crack Wi-Fi

Jordan Drysdale & Kent Ickler // Jordan and Kent demonstrate why there is only ONE correct way to configure your wireless networks. They also talk about the use of a […]

Read the entire post here
00198_05012017_UseNmapWithMeterpreter

Author, Brian Fehrman, External/Internal, Red Team All the Shellz, Debian, metasploit, meterpreter, Nmap, Pentesting, proxychains, Ubuntu

How to Use Nmap with Meterpreter

Brian Fehrman // You’ve sent your phishing ruse, the target has run the Meterpreter payload, and you have shell on their system. Now what? If you follow our blogs, you […]

Read the entire post here
«‹ 57 58 59 60›»

Looking For Something?

Browse by category

Recent Posts

  • smart goals_header (1)How to Set Smart Goals (That Actually Work For You)
    Setting goals is a deceptively simple career skill we
  • socinterview_headerInside the BHIS SOC: A Conversation with Hayden Covington 
    What happens when you ditch the tiered ticket queues
  • del3_headerAbusing Delegation with Impacket (Part 3): Resource-Based Constrained Delegation
    This is the third in a three-part series of blog posts

Browse by topic

Active Directory ADHD AI anti-virus Attack Tactics AV Beau Bullock BHIS Blue Team C2 Carrie Roberts cloud Cyber Deception hacking Hashcat infosec Infosec for Beginners InfoSec Survival Guide Joff Thyer john strand Jordan Drysdale Kent Ickler Kerberos Linux MailSniper Microsoft Nessus Nmap passwords password spraying pen-testing penetration testing pentest Pentesting phishing PowerShell Python Red Team red teaming RITA Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security, Inc.

890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008


About Us | BHIS Tribe of Companies | Privacy Policy | Contact

Links
Search the site