Black Hills Information Security, Inc.
RSS
  • All Services
    • Complete Service Guide
    • Active SOC
    • AI Security Assessments
    • Blockchain Security
    • Blue Team Services
    • Continuous Penetration Testing
    • High-Profile Risk Assessments
    • Incident Response
    • Penetration Testing
  • Contact Us
    • Contact Us
    • Email Sign-Up
  • About Us
    • Security Consultants
    • Admin Team
    • Active SOC Team
    • Antisyphon Training
    • BHIS Tribe of Companies
  • Free Resources
    • Blogs
    • Free Cybersecurity Tools
    • Free Cybersecurity Webcasts
    • Podcasts
    • RITA
  • Training
    • BHIS & Antisyphon Training
    • WWHF Conference
  • Community
    • Discord
    • LinkedIn
    • YouTube
    • Bluesky
    • Twitter/X
    • Upcoming Events
  • Fun Stuff
    • Backdoors & Breaches
    • Merch, Zines & More
    • PROMPT# Zine
    • REKCAH
    • Books

Author, How-To, Kent Ickler Benchmarks, Hashcat Benchmarks, Kent Ickler, Nvidia GTX, Password Cracker, The Kraken

Hashcat Benchmarks for Nvidia GTX 1080TI & GTX 1070 Hashcat Benchmarks

Kent Ickler // In my last post, I was building a password cracking rig and updating an older rig with new GPU cards. I struggled during the design process to […]

Read the entire post here
pasted image 0-1

Author, Kent Ickler, Red Team, Red Team Tools Build, Hash, Hashcat, Hashcat Benchmarks, Kent Ickler, Nvidia GTX 1070, password, Password Cracker, Password cracking, Summer2017, The Kraken

How to Build a Password Cracker with NVidia GTX 1080TI & GTX 1070

Kent Ickler // The Task Buy The Things: Total for new password cracking machine$5110 A Few Quick Lessons The CPU cooler doesn’t actually clear the case cover. This was OK […]

Read the entire post here
Screen Shot 2017-06-15 at 8.36.57 AM

Author, Brian Fehrman, Red Team, Red Team Tools, Webcasts live webcast, PowerLine, PowerOps framework, webcast

WEBCAST: A Powerful New Tool – PowerLine!

Brian Fehrman // Running into environments where the use of PowerShell is being monitored or is just flat-out disabled? Have you tried out the fantastic PowerOps framework but are wishing […]

Read the entire post here
firefox

Author, Brian King, General InfoSec Tips & Tricks, InfoSec 201 Firefox, Firefox extentions, HTTP, penetreation testing, Pentesting, quieter Firefox, tool, webapp test

Towards a Quieter Firefox

Brian King // On a recent webapp test, I got a little frustrated with all the extra HTTP requests showing up in my Burpsuite Proxy History from connections that Firefox […]

Read the entire post here
How to Identify Network Vulnerabilities with NetworkRecon.ps1

Author, David Fletcher, External/Internal, Red Team, Red Team Tools network traffic, Network Vulnerabilities, NetworkRecon.ps1, tools

How to Identify Network Vulnerabilities with NetworkRecon.ps1

David Fletcher //   Whenever I have the opportunity, I like to perform packet collection on a test for about five minutes so I can analyze the results and look […]

Read the entire post here
AP2

Phishing, Red Team, Red Team Tools macros, MS Excel, MS Office, MS Word, Risky Business

How to Get Malicious Macros Past Email Filters

Carrie Roberts //       A malicious macro in a Microsoft Word or Excel document is an effective hacking technique. These documents could be delivered in a variety of […]

Read the entire post here
00203_05152017_DomainGoodness-1

Author, External/Internal, Red Team, Red Team Tools, Sally Vandeven AD Explorer, DA, domain admin, Pentesting, Shodan

Domain Goodness – How I Learned to LOVE AD Explorer

Sally Vandeven // OR How to Pentest with AD Explorer! Mark Russinovich’s Sysinternals tools (Microsoft) are nothing new. They have been a favorite among system administrators for many, many years. […]

Read the entire post here

Author, Joff Thyer, Red Team, Red Team Tools, Webcasts Blue Team, how to analyze log frequency with python, log analysis, Log File Frequency Analysis, Python, Red Team

WEBCAST: Log File Frequency Analysis with Python

Joff Thyer // Information Security professionals often have reason to analyze logs. Whether Red Team or Blue Team, there are countless times that you find yourself using “grep”, “tail”, “cut”, […]

Read the entire post here
00201_05102017_EvadeApplicationWhitelisting

Author, External/Internal, Joff Thyer, Red Team, Red Team Tools Casey Smith, COM+ scriplets, DLL, subtee, Wevade, whitelisting

How to Evade Application Whitelisting Using REGSVR32

Joff Thyer // I was recently working on a Red Team for a customer that was very much up to date with their defenses. This customer had tight egress controls, […]

Read the entire post here
«‹ 58 59 60 61›»

Looking For Something?

Browse by category

Recent Posts

  • How To Lead Effective Cybersecurity TabletopsHow to Lead Effective Tabletops
    Learn how to transform boring, meeting-style security
  • grc_header (1)Understanding GRC: How to Navigate Risks and Compliance Standards
    “GRC” isn’t all witchcraft and administrative
  • Linux Persistence For PentestersThe “P” in PAM is for Persistence: Linux Persistence Technique
    Learn about a pentesting tool using the Pluggable

Browse by topic

Active Directory ADHD AI anti-virus Attack Tactics AV Beau Bullock BHIS Blue Team C2 Carrie Roberts cloud Cyber Deception hacking infosec Infosec for Beginners InfoSec Survival Guide Joff Thyer john strand Jordan Drysdale Kent Ickler Kerberos Linux MailSniper Malware Microsoft Nessus Nmap passwords password spraying pen-testing penetration testing pentest Pentesting phishing PowerShell Python Red Team red teaming RITA Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security, Inc.

890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008


About Us | BHIS Tribe of Companies | Privacy Policy | Contact

Links
Search the site