Black Hills Information Security
Penetration testing for Fortune 50 companies since 2008.
RSS
  • About Us
    • Testers
    • Admin
    • SOC/HTOC Team
    • Partners
    • Interns
    • BHIS Tribe of Companies
  • Contact
    • Contact Us
    • Email Sign-Up
  • Services
    • Active SOC
    • Blockchain Security
    • Blue Team Services
    • Hunt Teaming (HTOC)
    • Incident Response
    • Penetration Testing
  • Projects/Tools
    • All Tools
    • RITA
    • Backdoors & Breaches
    • Books
    • REKCAH
  • Learn
    • Blog
    • Conference
    • Podcasts
    • PROMPT# Zine
    • Training
    • Upcoming Events
    • Webcasts
  • Community
    • Discord
    • LinkedIn
    • Swag Request
    • T-Shirts & Hoodies
    • Twitter
    • YouTube
Service Detection – Tomcat Manager, From “Info” to “Ouch”

Red Team, Web App Info2Ouch, Nessus, Vulnerabilities

Service Detection – Tomcat Manager, From “Info” to “Ouch”

Carrie Roberts // Continuing on the thread of highlighting Nessus vulnerability scan results that turned out to be more severe than reported . . . I always review the “Info” level “Service […]

Read the entire post here

Asterisk SIP Server, From “Info” to “Ouch”

External/Internal, Password Spray, Red Team Info2Ouch, Nessus, Vulnerabilities

Asterisk SIP Server, From “Info” to “Ouch”

Carrie Roberts // I learned some new stuff that will make me pay attention to “Asterisk Detection” Nessus informational findings in the future . . . On an external network […]

Read the entire post here

InfoSec 301 Blue Team, Danger Will Robinson, MS15-034, Patch, Purple Team, Red Team, Remote Code Execution

Waiting Is the Hardest Part: A Purple Team’s Take on MS15-034

Mick Douglas // Current Status: – MS15-034 has remote Denial of Service (DoS) – Remote exploit code appears to be ready soon… maybe.  Stay tuned. BLUE TEAM MARCHING ORDERS: – […]

Read the entire post here

A Need For A Change – or – Burning Your Money

InfoSec 201, News breach, external breach, internal breach, it security, verizon breach report

A Need For A Change – or – Burning Your Money

Mick Douglas // Take look at this chart from last year’s Verizon Data Breach Report.  It shows who notified the breached party when they were attacked. This graph is a […]

Read the entire post here

«‹ 59 60 61 62

Follow Us

Looking For Something?

Browse by category

Recent Posts

  • BLOG_chalkboard_00611How to Build a Pentest Robot With Selenium IDE
    Have you ever been on a pentest and thought to
  • BLOG_chalkboard_00610PNPT: Certification Review
    Daniel Pizarro // What is the PNPT?  The
  • Talkin’ About Infosec News – 1/25/2023
    00:00 – PreShow Banter™ — Wade’s Googly

Browse by topic

Active Directory ADHD anti-virus Attack Tactics AV Beau Bullock Blue Team bypassing AV C2 Carrie Roberts command and control hacking hardware hacking Hashcat infosec Joff Thyer john strand Jordan Drysdale Kent Ickler Linux MailSniper Microsoft Nessus Password cracking password policy passwords password spraying pen-testing penetration testing pentest Pentesting phishing podcast PowerShell Python Raymond Felch Red Team red teaming RITA social engineering Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security

115 W. Hudson St. Spearfish, SD 57783 | 701-484-BHIS
© 2008

Links
Search the site