Black Hills Information Security
RSS
  • About Us
    • Security Analysts
    • Admin
    • SOC/HTOC Team
    • Partners
    • Interns
    • BHIS Tribe of Companies
  • Contact
    • Contact Us
    • Email Sign-Up
  • Services
    • Active SOC
    • ANTISOC
    • Blockchain Security
    • Blue Team Services
    • High-Profile Risk Assessments
    • Hunt Teaming (HTOC)
    • Incident Response
    • Penetration Testing
  • Projects/Tools
    • All Tools
    • RITA
    • Books
    • REKCAH
  • Learn
    • Backdoors & Breaches
    • Blog
    • Conference
    • Podcasts
    • PROMPT# Zine
    • Upcoming Events
    • Webcasts
  • Community
    • Discord
    • LinkedIn
    • T-Shirts & Hoodies
    • Twitter
    • YouTube
  • Training

Author, Brian Fehrman, How-To, InfoSec 301

Evil Twin: WPA2 Enterprise Syle on Kali 2.0

Brian Fehrman //

Read the entire post here

The New Security Fundamentals – Kill Your AV

Author, How-To, InfoSec 201, John Strand AV, firewalls, Kill your AV, say no to networks, turn off networks

The New Security Fundamentals – Kill Your AV

John Strand // AV is Dead Long Live Whitelisting. We have been discovering more and more of our tests bypass AV controls with ease.  We have yet to see any iteration or […]

Read the entire post here

How Compliance Compromises Happen. (Or, The Most Boring Article Title in the History of All the  Internet…)

Author, InfoSec 201, John Strand

How Compliance Compromises Happen. (Or, The Most Boring Article Title in the History of All the Internet…)

John Strand // There have been quite a few articles lately on how compliance standard X or Y is broken.  Unfortunately, this often leads to blaming the nameless and faceless people behind the […]

Read the entire post here

BLOG_chalkboard_00009

Author, Joff Thyer, Password Spray, Red Team Joff Thyer, password spraying, RPCCLINET

Password Spraying & Other Fun with RPCCLIENT

Joff Thyer //   Many of us in the penetration testing community ar​e used to scenarios whereby we land a targeted phishing campaign within a Windows enterprise environment and have […]

Read the entire post here

Modifying Metasploit x64 template for AV evasion

Author, External/Internal, Joff Thyer, Red Team AV, AV evasion, modifying measpoilt, shellcode

Modifying Metasploit x64 template for AV evasion

Joff Thyer //   When performing a penetration of test of organizations with Windows desktops, many testers will now resort to using tools like Veil’s Powershell Empire in order to […]

Read the entire post here

Service Detection – Tomcat Manager, From “Info” to “Ouch”

Red Team, Web App Info2Ouch, Nessus, Vulnerabilities

Service Detection – Tomcat Manager, From “Info” to “Ouch”

Carrie Roberts // Continuing on the thread of highlighting Nessus vulnerability scan results that turned out to be more severe than reported . . . I always review the “Info” level “Service Detection” […]

Read the entire post here

Asterisk SIP Server, From “Info” to “Ouch”

External/Internal, Password Spray, Red Team Info2Ouch, Nessus, Vulnerabilities

Asterisk SIP Server, From “Info” to “Ouch”

Carrie Roberts // I learned some new stuff that will make me pay attention to “Asterisk Detection” Nessus informational findings in the future . . . On an external network […]

Read the entire post here

InfoSec 301 Blue Team, Danger Will Robinson, MS15-034, Patch, Purple Team, Red Team, Remote Code Execution

Waiting Is the Hardest Part: A Purple Team’s Take on MS15-034

Mick Douglas // Current Status: – MS15-034 has remote Denial of Service (DoS) – Remote exploit code appears to be ready soon… maybe.  Stay tuned. BLUE TEAM MARCHING ORDERS: – […]

Read the entire post here

A Need For A Change – or – Burning Your Money

InfoSec 201, News breach, external breach, internal breach, it security, verizon breach report

A Need For A Change – or – Burning Your Money

Mick Douglas // Take look at this chart from last year’s Verizon Data Breach Report.  It shows who notified the breached party when they were attacked. This graph is a […]

Read the entire post here

«‹ 61 62 63 64

Follow Us

Looking For Something?

Browse by category

Recent Posts

  • Talkin’ About Infosec News – 9/18/2023
  • BLOG_chalkboard_00639Stop Phishing Yourself: How Auto-Forwarding and Exchange Contacts Can Stab You in the Back
    Hayden Covington // Phishing is an ever-present
  • Talkin’ About Infosec News – 9/11/2023

Browse by topic

Active Directory ADHD anti-virus Attack Tactics AV Beau Bullock Blue Team bypassing AV C2 Carrie Roberts command and control hacking hardware hacking Hashcat infosec Joff Thyer john strand Jordan Drysdale Kent Ickler Linux MailSniper Malware Microsoft Nessus password policy passwords password spraying pen-testing penetration testing pentest Pentesting phishing podcast PowerShell Python Raymond Felch Red Team red teaming RITA social engineering Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security

890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008-2023


About Us | BHIS Tribe of Companies | Privacy Policy | Contact

Links
Search the site