Black Hills Information Security, Inc.
RSS
  • All Services
    • Complete Service Guide
    • Active SOC
    • AI Security Assessments
    • Blockchain Security
    • Blue Team Services
    • Continuous Penetration Testing
    • High-Profile Risk Assessments
    • Incident Response
    • Penetration Testing
  • Contact Us
    • Contact Us
    • Email Sign-Up
  • About Us
    • Security Consultants
    • Admin
    • SOC Team
    • Antisyphon Training
    • BHIS Tribe of Companies
  • Free Resources
    • Blogs
    • Free Cybersecurity Tools
    • Free Cybersecurity Webcasts
    • Podcasts
    • RITA
  • Training
    • BHIS & Antisyphon Training
    • WWHF Conference
  • Community
    • Discord
    • LinkedIn
    • YouTube
    • Bluesky
    • Twitter/X
    • Upcoming Events
  • Fun Stuff
    • Backdoors & Breaches
    • Merch, Zines & More
    • PROMPT# Zine
    • REKCAH
    • Books
RITA drawing

Author, Blue Team, Hunt Teaming, John Strand, Webcasts network tools, open source tools, Real Intelligence Threat Analysis, RITA, tool

WEBCAST: RITA

John Strand // Want to get started on a hunt team and discover “bad things” on your network? In this webcast, we will walk through the installation and usage of […]

Read the entire post here
Typing

InfoSec 101 Growing Pains, information security, Market Forces, Parents, Responsibility & Privilege, Supply & Demand

End-User Education: Getting the Parentals Onboard

Sierra Ward // We’re getting to that stage of life where we have to make some hard decisions regarding our parents.  How do we help them through sickness? When and […]

Read the entire post here
keep_calm

External/Internal, Red Team 2FA, ask and it will be given to you, bypassing 2fa, help desk, helpful help desk, MailSniper, OWA, password policy, passwords, pen-testing, penetration testing, pentest, Pentesting, two-factor, VPN

How to Bypass Two-Factor Authentication – One Step at a Time

Sally Vandeven // Back in November Beau Bullock wrote a blog post describing how his awesome PowerShell tool MailSniper can sometimes bypass OWA portals to get mail via EWS if […]

Read the entire post here
Go Ahead, Make Our Day

InfoSec 201 easter eggs, low hanging fruit, pen-testing, penetration testing, Pentesting, the best parts of our job

Go Ahead, Make Our Day

Sally Vandeven & the BHIS Team // I was recently on an assessment where I was able to grab all the password hashes from the domain controller. When I extracted the hashes and […]

Read the entire post here
memory_analysis_screenshot

Author, Blue Team, Blue Team Tools, John Strand, Webcasts Memory Forensics, webcasts, Windows, Windows Memory Forensics

WEBCAST: Windows Memory Forensics

John Strand // In the last webcast we covered initial Windows Live Forensics (see the recording here), in this one we play with memory from a compromised system. We cover the […]

Read the entire post here
backpack

Author, Jordan Drysdale, Red Team, Wireless onsite, pen-testing, penetration testing, Pentesting, Wi-Fi travel kit, wireless kit

The Wi-Fi Travel Kits

Jordan Drysdale // Sally and I recently ventured to an on-site wireless engagement with a very security-mature customer. Long story short, the level of protection that WPA2 Enterprise with certificate validation provides […]

Read the entire post here
Pink_Teaming_Dilution

Author, John Strand, Red Team industry trends, Pentesting, pink teaming, red teaming

Pink Teaming: The Dilution of Pentesting

John Strand // There have been a few conversations at conferences and meet-ups over the past year or so about the validity of penetration testing. There are many things on […]

Read the entire post here
Gtftf1qMeUiq_kP_bQVa5QOBWO5yFsU5cjt96PJBeB4ToW2BOcxclotSKW5pIKh6uQDeiA=s2048

Author, Brian King, How-To GNU screen, handwriting, learning, memory, reference, SSH session

GNU Screen Quick Reference

Brian King // I use GNU Screen mainly to prevent processes from dying when I disconnect from an SSH session, but GNU Screen can do a whole lot more than that […]

Read the entire post here
wallhaven-210652

Author, Derek Banks, Physical, Red Team, Red Team Tools DIY, DuckHunter, HID attack, KALI, Kali Linux, Kali NetHunter, mobile hacking platform, Mobile Pentesting Platform, Nexus7, Rooted Nexus7

How to DIY a Mobile Hacking Platform – Kali NetHunter on a Rooted Nexus7

Derek Banks //   As pentesters, it is probably not a surprise that we tend to make fairly heavy use of Kali Linux on a fairly regular basis. The folks at Offensive […]

Read the entire post here
«‹ 61 62 63 64›»

Looking For Something?

Browse by category

Recent Posts

  • deadwood_headerWhen the SOC Goes to Deadwood: A Night to Remember 
    Hear a tale about the time the BHIS SOC team conducted
  • Social Engineering and Microsoft SSPRSocial Engineering and Microsoft SSPR: The Road to Pwnage is Paved with Good Intentions 
    This scenario simultaneously tests identity
  • cyber threats_headerCommon Cyber Threats
    In today’s interconnected digital world, information

Browse by topic

Active Directory ADHD AI anti-virus Attack Tactics AV Beau Bullock BHIS Blue Team C2 Carrie Roberts cloud Cyber Deception hacking Hashcat infosec Infosec for Beginners InfoSec Survival Guide Joff Thyer john strand Jordan Drysdale Kent Ickler Kerberos Linux MailSniper Microsoft Nessus Nmap passwords password spraying pen-testing penetration testing pentest Pentesting phishing PowerShell Python Red Team red teaming RITA Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security, Inc.

890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008


About Us | BHIS Tribe of Companies | Privacy Policy | Contact

Links
Search the site