Black Hills Information Security, Inc.
RSS
  • All Services
    • Complete Service Guide
    • Active SOC
    • AI Security Assessments
    • Blockchain Security
    • Blue Team Services
    • Continuous Penetration Testing
    • High-Profile Risk Assessments
    • Incident Response
    • Penetration Testing
  • Contact Us
    • Contact Us
    • Email Sign-Up
  • About Us
    • Security Consultants
    • Admin
    • SOC Team
    • Antisyphon Training
    • BHIS Family of Companies
  • Free Resources
    • Blogs
    • Free Cybersecurity Tools
    • Free Cybersecurity Webcasts
    • Podcasts
    • RITA
  • Training
    • BHIS & Antisyphon Training
    • WWHF Conference
  • Online Community
    • Discord
    • LinkedIn
    • YouTube
    • Bluesky
    • Twitter/X
    • Upcoming Events
  • Fun Stuff
    • Backdoors & Breaches
    • Merch, Zines & More
    • PROMPT# Zine
    • REKCAH
    • Books
google_socks_diagram.png

C2, Red Team C2, Google Drive

Google Docs becomes Google SOCKS: C2 Over Google Drive

Luke Baggett // If you’re monitoring a network with internet access, it’s almost inevitable that you’re going to see a lot of traffic to and from Google servers. Blending in […]

Read the entire post here
Lawrence Hoffman

InfoSec 101, News 4A, Cryptography, Election2016, Gov Hacking, hardware hacking, Microsoft, PowerShell, reverse engineering, Tinfoil Hat, Weird Stuff

Lawrence’s List 081916

Lawrence Hoffman // So Microsoft is open sourcing PowerShell and putting it on Linux. Realistically Linux already has a full suite of administrative tools and some very powerful scripting languages […]

Read the entire post here
It’s Always Nice to Have Cron-ies!

How-To Linus, n00b, red tape, VPN

It’s Always Nice to Have Cron-ies!

Rick Wisser // I have been asked by some friends, (not very Linux proficient friends) to share this. I thought I would create a blog post and share with all. […]

Read the entire post here

Author, John Strand, Red Team, Red Team Tools, Webcasts Man-in-the-Middle, MITM

Webcast Recording: Man in the Middle Attacks

In this webcast we walked through the current super cool crop of MITM tools. We looked at Bettercap, MITMf and discussed LLMNR and WPAD poisoning attacks.  Also, this was a new […]

Read the entire post here
Lawrence Hoffman

InfoSec 101, News Apple, boot key, bug bounty, Exodus, Microsoft, TCp attack

Lawrence’s List 081216

Lawrence Hoffmann // So, Apple announced a new bug bounty program at BlackHat, and there are some interesting deviations from the norm in their plan to implement and pay out. […]

Read the entire post here
One Does Not Simply - ONE DOES NOT SIMPLY Run BASH Commands on a Windows System

How-To Azure, Bash Commands, Linux, phishing, PowerShell, Social Engineering Toolkit, Windows, Windows10

Time To Bash on Windows (Bourne Again Shell That Is)

Editor’s Note: This is another awesome guest post from our friend, Robert Schwass. If you’d like to guest post contact us here. Robert Schwass // I had heard the rumors about […]

Read the entire post here
00097_08082016_AreYouInfosecSynced(2)

Author, InfoSec 101, Joff Thyer business departments, defensive security, infosec, infosec design

Are You InfoSec Synced?

Joff Thyer // One of my observations over time in the Information Security market is that the vendors seem to want to solve challenges with appliance point solutions.  It is […]

Read the entire post here
Lawrence Hoffman

InfoSec 101, News browser holes, development, Felony, more security, Pwn2Own, Software engineer, trend micro, venmo

Lawrence’s List 080516

Lawrence Hoffman // With BlackHat and DefCon happening as I type it’s hard to choose what’s going to make this list. I will probably save most of the big shiny […]

Read the entire post here
00095_08032016_HowToBuildYourOwnPenetrationTestingDropBox2

Author, Beau Bullock, Red Team, Red Team Tools Beau Bullock, build your own, hardware hacking, pen-testing, red teaming

How to Build Your Own Penetration Testing Drop Box

Beau Bullock // TL;DR I compared three single-board computers (SBC) against each other with a specific goal of finding which one would serve best as a “penetration testing dropbox”, and […]

Read the entire post here
«‹ 68 69 70 71›»

Looking For Something?

Browse by category

Recent Posts

  • smart goals_header (1)How to Set Smart Goals (That Actually Work For You)
    Setting goals is a deceptively simple career skill we
  • socinterview_headerInside the BHIS SOC: A Conversation with Hayden Covington 
    What happens when you ditch the tiered ticket queues
  • del3_headerAbusing Delegation with Impacket (Part 3): Resource-Based Constrained Delegation
    This is the third in a three-part series of blog posts

Browse by topic

Active Directory ADHD AI anti-virus Attack Tactics AV Beau Bullock BHIS Blue Team C2 Carrie Roberts cloud Cyber Deception hacking Hashcat infosec Infosec for Beginners InfoSec Survival Guide Joff Thyer john strand Jordan Drysdale Kent Ickler Kerberos Linux MailSniper Microsoft Nessus Nmap passwords password spraying pen-testing penetration testing pentest Pentesting phishing PowerShell Python Red Team red teaming RITA Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security, Inc.

890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008


About Us | BHIS Tribe of Companies | Privacy Policy | Contact

Links
Search the site