Black Hills Information Security, Inc.
RSS
  • All Services
    • Complete Service Guide
    • Active SOC
    • AI Security Assessments
    • Blockchain Security
    • Blue Team Services
    • Continuous Penetration Testing
    • High-Profile Risk Assessments
    • Incident Response
    • Penetration Testing
  • Contact Us
    • Contact Us
    • Email Sign-Up
  • About Us
    • Security Consultants
    • Admin Team
    • Active SOC Team
    • Antisyphon Training
    • BHIS Tribe of Companies
  • Free Resources
    • Blogs
    • Free Cybersecurity Tools
    • Free Cybersecurity Webcasts
    • Podcasts
    • RITA
  • Training
    • BHIS & Antisyphon Training
    • WWHF Conference
  • Community
    • Discord
    • LinkedIn
    • YouTube
    • Bluesky
    • Twitter/X
    • Upcoming Events
  • Fun Stuff
    • Backdoors & Breaches
    • Merch, Zines & More
    • PROMPT# Zine
    • REKCAH
    • Books
00213_07102017_EndpointMonitoringShoestringBudget

Author, Blue Team, Blue Team Tools, Derek Banks, Joff Thyer, Webcasts Breadcrumb Trails, elasticsearch, Endpoint Monitoring, kibana, Logstash, Monitoring, NXlog, Sysmon

How To Do Endpoint Monitoring on a Shoestring Budget – Webcast Write-Up

Joff Thyer & Derek Banks // Editor’s Note: This is a more in-depth write-up based on the webcast which can be watched here. As penetration testers, we often find ourselves […]

Read the entire post here
cactus

Author, How-To, Kent Ickler Cacti, HP ProCurve, Kent Ickler, ProCurve, ProCurve Switch, Switch

How to Add an HP ProCurve Switch to Cacti via SSH/Telnet/CLI

Kent Ickler // In my recent post, we installed and got Cacti up and running. Now, we’re going to add our first switch into Cacti’s services. Switch: This is an HP-Procurve line […]

Read the entire post here
Screen Shot 2017-07-03 at 10.34.27 AM

Author, Blue Team, Blue Team Tools, Derek Banks, Joff Thyer, Webcasts

WEBCAST: How To Do Consolidated Endpoint Monitoring on a Shoestring Budget

Derek Banks & Joff Thyer // If you’re not currently logging and monitoring the Windows endpoints on the edge of your network you are missing valuable information that is not […]

Read the entire post here
cactus

Author, How-To, Kent Ickler Cacti, data, go hug a cactus, Kent Ickler, Net Admin, Network monitoring, switches, Ubuntu

How to Install Cacti 1.1.10 on Ubuntu 16.04

Kent Ickler // What is Cacti? Cacti is a network system that inputs system-generated quantifiable data and presents the data in spiffy graphs. Net-Admin In the Net-Admin world, it gives […]

Read the entire post here

Author, How-To, Kent Ickler Benchmarks, Hashcat Benchmarks, Kent Ickler, Nvidia GTX, Password Cracker, The Kraken

Hashcat Benchmarks for Nvidia GTX 1080TI & GTX 1070 Hashcat Benchmarks

Kent Ickler // In my last post, I was building a password cracking rig and updating an older rig with new GPU cards. I struggled during the design process to […]

Read the entire post here
pasted image 0-1

Author, Kent Ickler, Red Team, Red Team Tools Build, Hash, Hashcat, Hashcat Benchmarks, Kent Ickler, Nvidia GTX 1070, password, Password Cracker, Password cracking, Summer2017, The Kraken

How to Build a Password Cracker with NVidia GTX 1080TI & GTX 1070

Kent Ickler // The Task Buy The Things: Total for new password cracking machine$5110 A Few Quick Lessons The CPU cooler doesn’t actually clear the case cover. This was OK […]

Read the entire post here
Screen Shot 2017-06-15 at 8.36.57 AM

Author, Brian Fehrman, Red Team, Red Team Tools, Webcasts live webcast, PowerLine, PowerOps framework, webcast

WEBCAST: A Powerful New Tool – PowerLine!

Brian Fehrman // Running into environments where the use of PowerShell is being monitored or is just flat-out disabled? Have you tried out the fantastic PowerOps framework but are wishing […]

Read the entire post here
firefox

Author, Brian King, General InfoSec Tips & Tricks, InfoSec 201 Firefox, Firefox extentions, HTTP, penetreation testing, Pentesting, quieter Firefox, tool, webapp test

Towards a Quieter Firefox

Brian King // On a recent webapp test, I got a little frustrated with all the extra HTTP requests showing up in my Burpsuite Proxy History from connections that Firefox […]

Read the entire post here
How to Identify Network Vulnerabilities with NetworkRecon.ps1

Author, David Fletcher, External/Internal, Red Team, Red Team Tools network traffic, Network Vulnerabilities, NetworkRecon.ps1, tools

How to Identify Network Vulnerabilities with NetworkRecon.ps1

David Fletcher //   Whenever I have the opportunity, I like to perform packet collection on a test for about five minutes so I can analyze the results and look […]

Read the entire post here
«‹ 58 59 60 61›»

Looking For Something?

Browse by category

Recent Posts

  • Proxy execution via WebView2 bannerSigned, Trusted, and Abused: Proxy Execution via WebView2
    An offensive security perspective on Microsoft Edge
  • Getting Started in PentestingGetting Started In Pentesting – Advice From The BHIS Pentest Lead
    Advice about getting started in pentesting from the
  • Tips and Resources for Securing the CloudCloud Security: Tips and Resources for Securing the Cloud
    This overview of the basics of Cloud Security includes

Browse by topic

Active Directory ADHD AI anti-virus Attack Tactics AV Beau Bullock BHIS Blue Team C2 Carrie Roberts cloud Cyber Deception hacking infosec Infosec for Beginners InfoSec Survival Guide Joff Thyer john strand Jordan Drysdale Kent Ickler Kerberos Linux MailSniper Malware Microsoft Nessus Nmap passwords password spraying pen-testing penetration testing pentest Pentesting phishing PowerShell Python Red Team red teaming RITA Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security, Inc.

890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008


About Us | BHIS Tribe of Companies | Privacy Policy | Contact

Links
Search the site