Black Hills Information Security
Penetration testing for Fortune 50 companies since 2008.
  • About Us
    • Testers
    • Admin
    • Partners
    • Interns
  • Contact
    • Contact Us
    • Email Sign-Up
  • Services
    • Penetration Testing
    • Active SOC
    • Blue Team Services
    • Hunt Team (HTOC)
    • Cyber Range
  • Projects/Tools
    • All Tools
    • RITA
    • Backdoors & Breaches
    • Books
  • Learn
    • Blog
    • Webcasts
    • Podcasts
    • Training
00461_04292020_PentestersVoyage

How-To, Informational, InfoSec 101, Red Team

A Pentester’s Voyage – The First Few Hours

Jordan Drysdale // Many methodologies have been written, but the first few hours on an internal pentest tell the story of an organization’s security culture. This type of test differs from an assumed compromise or pivot in that the tester walks into the network fully armed. requirements.txt Nmap: https://nmap.org/  Responder: https://github.com/lgandx/Responder  Impacket: https://github.com/SecureAuthCorp/Impacket  CrackMapExec: https://github.com/byt3bl33d3r/CrackMapExec  […]

Read the entire post here

00460_04292020_SecurelyDeployingIPv6

Informational, InfoSec 101 IPv6, Joff Thyer

Securely Deploying IPv6 in 2020 Part 1: Internet Facing Perimeter

Joff Thyer // Introduction If there is anything that the start of 2020 has taught us, it is that Internetworking services are in higher demand than ever before.  IPv4 is exhausted, and by that I mean there is none, it is tired, worn out, overused, abused, and beyond its end of life.  Besides our heroic […]

Read the entire post here

00459_04272020_WebcastFreeTools

Fun & Games, How-To, Informational, InfoSec 101, Podcasts, Webcasts Brian King, JavaScript, webapp

Webcast: Free Tools! How to Use Developer Tools and Javascript in Webapp Pentests

I like webapps, don’t you? Webapps have got to be the best way to learn about security. Why? Because they’re self-contained and so very transparent. You don’t need a big ol’ lab before you can play with them. You can run them in a single tiny VM or even tiny-er Docker image on your laptop. […]

Podcast: Play in new window | Download

Subscribe: RSS

Read the entire post here

00450_030202020_BasicGoogleSearches

How-To, Informational, InfoSec 101 Google

Getting Started With Basic Google Searches

Hello and welcome. My name is John Strand and in this video, we’re going to be talking about some very basic Google searches. Now we’ve got to take a couple of steps back and talk about what Google actually does. Google goes through and it indexes all the different texts and images and things they […]

Read the entire post here

00449_030202020_Base64

How-To, Informational Base64

Getting Started With Base64 Encoding and Decoding

Hello and welcome. My name is John Strand and in this video, we’re going to be talking about Base64 encoding and decoding. Now the reason why we’re talking about it is once again we have the BHIS Cyber Range for our customers and friends and this is just basically a video to walk people through […]

Read the entire post here

00458_04242020_WebcastBuildHomeLab

How-To, Informational, InfoSec 101, Podcasts, Webcasts Bill Stearns, john strand

Webcast: How to Build a Home Lab

This is a joint webcast from Black Hills Information Security and Active Countermeasures. How many of us have tried some new configuration option, utility, or hardware on a production environment, only to crash a critical piece of the business? (me raising hand…) It’s amazing how quickly we learn not to do that! Now we have […]

Podcast: Play in new window | Download

Subscribe: RSS

Read the entire post here

00448_03202020_ROTObfuscation

How-To, Informational, InfoSec 101, Red Team john strand

Getting Started With ROT Obfuscation

Hello, my name is John Strand. In this video, we’re going to be talking about ROT or rotate. Why exactly are we talking about one specific thing? Well, this particular video is used with our Cyber Range that we’re establishing at Black Hills Information Security and it’s very common when you’re pentesting or you’re doing […]

Read the entire post here

00447_03202020_Honeybadger

How-To, Informational, InfoSec 101, Red Team, Red Team Tools HoneyBadger

Getting Started With Tracking Hackers With HoneyBadger

Hello and welcome. My name is John Strand, and in this video, we’re going to talk a little bit about HoneyBadger. Now, in a number of other videos and a number of other things whenever you’re talking about attribution or cyber deception, you can focus on creating documents or elements that’ll beacon back and many […]

Read the entire post here

00457_04152020_HomeNetworkDesignPart2

How-To, Informational, InfoSec 101 ethan robish, home network

Home Network Design – Part 2

Ethan Robish // Why Segment Your Network? Here’s a quick recap from Part 1. A typical home network is flat. This means that all devices are connected to the same router and are on the same subnet. Each device can communicate with every other with no restrictions at the network level. This network’s first line […]

Read the entire post here

«‹ 5 6 7 8 9 ›»

Follow Us

Looking For Something?

Subscribe to the BHIS blog

Don't get left in the dark! Enter your email address and every time a post goes live you'll get an instant notification! We'll also add you to our webcast list, so you won't miss our occasional emails about upcoming events! (We promise, we're not spammy!)

Browse by category

Recent Posts

  • Talkin’ About Infosec News – 2/24/2021
    Originally Aired on February 24, 2021 Articles
  • Talkin’ About Infosec News – 2/22/2021
    Originally Aired on February 22, 2021 Articles
  • Talkin’ About Infosec News – 2/17/2021
    Originally Aired on February 17, 2021 Articles

Browse by topic

Active Directory ADHD anti-virus Attack Tactics AV Blue Team bypassing AV C2 cloud command and control hardware hacking Hashcat infosec john strand Jordan Drysdale Kent Ickler Linux LLMNR MailSniper Microsoft Nessus Nmap Password cracking password policy passwords password spraying pen-testing penetration testing pentest Pentesting phishing podcast Podcasts PowerShell Python Raymond Felch Red Team red teaming RITA social engineering Sysmon tools webcast webcasts Windows

Archives

Black Hills Information Security

115 W. Hudson St. Spearfish, SD 57783 | 701-484-BHIS
© 2008

Links
Search the site