Black Hills Information Security
RSS
  • About Us
    • Security Analysts
    • Admin
    • SOC/HTOC Team
    • Partners
    • Interns
    • BHIS Tribe of Companies
  • Contact
    • Contact Us
    • Email Sign-Up
  • Services
    • Active SOC
    • ANTISOC
    • Blockchain Security
    • Blue Team Services
    • High-Profile Risk Assessments
    • Hunt Teaming (HTOC)
    • Incident Response
    • Penetration Testing
  • Projects/Tools
    • All Tools
    • RITA
    • Books
    • REKCAH
  • Learn
    • Backdoors & Breaches
    • Blog
    • Conference
    • Podcasts
    • PROMPT# Zine
    • Upcoming Events
    • Webcasts
  • Community
    • Discord
    • LinkedIn
    • T-Shirts & Hoodies
    • Twitter
    • YouTube
  • Training
Pentesting with Linked Clones

Author, Brian King, How-To, InfoSec 101 linked clones, Pentesting, virtual machine, VM

Pentesting with Linked Clones

Brian B. King // If working with several customers at once, or in succession, it would be easy to lose track of whose data you’re looking at, or to include […]

Read the entire post here

75fce7_17bef76f115246d593e62f14d349b4ae

External/Internal, Red Team encryption, mimikatz, passwords

Your Password Is… wait for it… NOT Always Encrypted

Sally Vandeven // As pentesters we LOVE passwords – they come in all shapes and sizes. A good password has 16+ characters and a mix of case, digits and special […]

Read the entire post here

75fce7_d032220af42e4aa98bc83e3cc00aa79f

Physical, Red Team hacking RFID, RFID

RFID Replaying with the Proxmarx3

Rick Wisser //  Ohhh Who Says Tree’s are not Interesting RFID’s (Radio-Frequency Identification) have been around for a while now and are utilized for Inventory tracking/control, retail, clothing, animal tracking, […]

Read the entire post here

InfoSec Basics & Fundamentals

Author, InfoSec 101, John Strand

InfoSec Basics & Fundamentals

John Strand // One of the more difficult aspects of getting started in any new field is knowing where to begin.  When I got started in this field in 2000 […]

Read the entire post here

Pentesting ASP.NET Cookieless Sessions with Burp

Red Team, Web App Asp .Net cookliness session, Burp, Pentesting

Pentesting ASP.NET Cookieless Sessions with Burp

Carrie Roberts & Brian King // We were recently testing a web application that used ASP.NET cookieless sessions. This meant that the session token was part of the URL as shown in the […]

Read the entire post here

Author, Brian Fehrman, How-To GoCat

GoCat – Advanced Testing, Evaluating and Breaking of Security Software

Brian Fehrman //

Read the entire post here

Using Simple Burp Macros to Automate Testing

Author, David Fletcher, Red Team, Red Team Tools, Web App Automated Testing, Burp Macros

Using Simple Burp Macros to Automate Testing

David Fletcher // Recently, while assessing a web application I noticed content on one of the pages that appeared to be derived from sensitive information stored within the site’s user […]

Read the entire post here

Developing Hacking Kung Fu (or How To Get Into Information Security)

Author, Derek Banks, General InfoSec Tips & Tricks, InfoSec 101

Developing Hacking Kung Fu (or How To Get Into Information Security)

Derek Banks //   More than occasionally I am asked how to get into Information Security as a profession.   As attacks and breaches continue to escalate in frequency the demand […]

Read the entire post here

C2, Red Team

Can we C2? Yes we can!

Dakota Nelson // It’s become more and more common lately to see advanced attackers using legitimate internet channels to move data in and out of networks. Social networks such as […]

Read the entire post here

«‹ 61 62 63 64

Follow Us

Looking For Something?

Browse by category

Recent Posts

  • Special Segment – Cyber Security Career Advice – 9/28/2023
  • Talkin’ About Infosec News – 9/25/2023
  • Talkin’ About Infosec News – 9/18/2023

Browse by topic

Active Directory ADHD anti-virus Attack Tactics AV Beau Bullock Blue Team bypassing AV C2 Carrie Roberts command and control hacking hardware hacking Hashcat infosec Joff Thyer john strand Jordan Drysdale Kent Ickler Linux MailSniper Malware Microsoft Nessus password policy passwords password spraying pen-testing penetration testing pentest Pentesting phishing podcast PowerShell Python Raymond Felch Red Team red teaming RITA social engineering Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security

890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008-2023


About Us | BHIS Tribe of Companies | Privacy Policy | Contact

Links
Search the site