Black Hills Information Security, Inc.
RSS
  • All Services
    • Complete Service Guide
    • Active SOC
    • AI Security Assessments
    • Blockchain Security
    • Blue Team Services
    • Continuous Penetration Testing
    • High-Profile Risk Assessments
    • Incident Response
    • Penetration Testing
  • Contact Us
    • Contact Us
    • Email Sign-Up
  • About Us
    • Security Consultants
    • Admin Team
    • Active SOC Team
    • Antisyphon Training
    • BHIS Tribe of Companies
  • Free Resources
    • Blogs
    • Free Cybersecurity Tools
    • Free Cybersecurity Webcasts
    • Podcasts
    • RITA
  • Training
    • BHIS & Antisyphon Training
    • WWHF Conference
  • Community
    • Discord
    • LinkedIn
    • YouTube
    • Bluesky
    • Twitter/X
    • Upcoming Events
  • Fun Stuff
    • Backdoors & Breaches
    • Merch, Zines & More
    • PROMPT# Zine
    • REKCAH
    • Books
Domain Password Audit Tool

Blue Team, Blue Team Tools, Red Team, Red Team Tools Domain Password Audit Tool, DPAT

Domain Password Audit Tool

Carrie Roberts // A tool to generate password usage statics in a Windows domain based on hashes dumped from a domain controller. The Domain Password Audit Tool (DPAT) is a […]

Read the entire post here
screen-shot-2016-11-30-at-11-08-12-am

Author, Beau Bullock, External/Internal, Red Team, Red Team Tools, Webcasts Email, MS, OWA, Vulnerabilities

WEBCAST: Exchange and OWA attacks – Step by Step

Here’s our webcast with Beau Bullock, Brian Fehrman & Carrie Roberts from Tuesday, November 29.

Read the entire post here
Malicious Outlook Rules in Action

External/Internal, How-To, Red Team Outlook

Malicious Outlook Rules in Action

 Carrie Roberts // Getting a shell using a malicious Outlook rule is an awesome tool during a pentest and great fun! Nick Landers had a great post including enough information to make […]

Read the entire post here
pasted-image-0

Author, Blue Team, Kent Ickler Jordan Drysdale, long passwords, Password Security Objects, passwords, Windows 95/96, Windows Admin

How to Increase the Minimum Character Password Length (15+) Policies in Active Directory

Kent Ickler // As a start to a series on Windows Administration in the eyes of a security-conscious “Windows Guy” I invite you on configuring AD DS PSOs (Password Security […]

Read the entire post here
00142_11232016_ UsingPowerShellEmpireWithATrustedCertificate

External/Internal, Red Team Carrie Roberts, Let's Encrypt, PowerShell, PowerShell Empire, Trusted Certificate

Using PowerShell Empire with a Trusted Certificate

Carrie Roberts* // Using a trusted certificate and non-default Empire options will help increase your chances of getting a successful session out of a network. Follow these instructions to get […]

Read the entire post here
image04

Author, Ethan Robish, Red Team, Red Team Tools author metadata, bugging documents, how to clear metadata, Microsoft, MS Excel, MS Word

Bugging Microsoft Files: Part 3 – Clearing Metadata

Ethan Robish // In my last two posts I showed how to insert tracking bugs in both .docx (Part 1) and .xlsx files (Part 2).  But don’t let all that effort go […]

Read the entire post here
e70b0fe287c678fa9b23205433528e74

Red Team, Red Team Tools Carrie Roberts, Empire commands, Empire Listeners, Listeners

How to Script Startup of Empire Listeners

Carrie Roberts //   Tired of typing those Empire commands to startup your goto listeners? Wish there was an equivalent to Metasploit resource files for Empire? This is not currently […]

Read the entire post here
73227552

Blue Team, Red Team DeepSec16, encryption, enter key, enter sesame, Linux, LUKS

Two Button PWNage

Logan Lembke // Step One: Power. Step Two: Enter. Step Three: ???? Step Four: Profit. In the security industry, we love our encryption. However sometimes, the complexity introduced by encryption […]

Read the entire post here
princess_toy

Author, Fun & Games, Jordan Drysdale, Red Team, Wireless Hand Crafted, hardware hacking, More Fun Projects, Princess Computer, Weaponizing Kids' Toys, Wi-Fi Attack Kits

Weaponizing Princess Toys: Crafting Wi-Fi Attack Kits

Jordan Drysdale // … Alternate Title: “Why I Love BHIS” So, I was gifted this cute little princessy-toy thing recently. My first thought was that my daughters will love this thing. […]

Read the entire post here
«‹ 65 66 67 68›»

Looking For Something?

Browse by category

Recent Posts

  • Lessons from a chatbot incidentLessons From A Chatbot Incident
    Real-world account of how insecure databases and an AI
  • How To Lead Effective Cybersecurity TabletopsHow to Lead Effective Tabletops
    Learn how to transform boring, meeting-style security
  • grc_header (1)Understanding GRC: How to Navigate Risks and Compliance Standards
    “GRC” isn’t all witchcraft and administrative

Browse by topic

Active Directory ADHD AI anti-virus Attack Tactics AV Beau Bullock BHIS Blue Team C2 Carrie Roberts cloud Cyber Deception hacking infosec Infosec for Beginners InfoSec Survival Guide Joff Thyer john strand Jordan Drysdale Kent Ickler Kerberos Linux MailSniper Malware Microsoft Nessus Nmap passwords password spraying pen-testing penetration testing pentest Pentesting phishing PowerShell Python Red Team red teaming RITA Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security, Inc.

890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008


About Us | BHIS Tribe of Companies | Privacy Policy | Contact

Links
Search the site