Black Hills Information Security, Inc.
RSS
  • All Services
    • Complete Service Guide
    • Active SOC
    • AI Security Assessments
    • Blockchain Security
    • Blue Team Services
    • Continuous Penetration Testing
    • High-Profile Risk Assessments
    • Incident Response
    • Penetration Testing
  • Contact Us
    • Contact Us
    • Email Sign-Up
  • About Us
    • Security Consultants
    • Admin
    • SOC Team
    • Antisyphon Training
    • BHIS Family of Companies
  • Free Resources
    • Blogs
    • Free Cybersecurity Tools
    • Free Cybersecurity Webcasts
    • Podcasts
    • RITA
  • Training
    • BHIS & Antisyphon Training
    • WWHF Conference
  • Online Community
    • Discord
    • LinkedIn
    • YouTube
    • Bluesky
    • Twitter/X
    • Upcoming Events
  • Fun Stuff
    • Backdoors & Breaches
    • Merch, Zines & More
    • PROMPT# Zine
    • REKCAH
    • Books
employee jd 5

Author, Blue Team, Blue Team Tools, Jordan Drysdale ansible, Ansible Galaxy, Linux

Securing Your Way to Restful Sleep with Ansible Galaxy

Jordan Drysdale //   Life as a ‘blue-teamer’ can often be a stressful experience. Working in an environment with a strong Linux infrastructure  can help some, but Ansible  can help […]

Read the entire post here
Three Simple Disguises for Evading Antivirus

Red Team 64-bit, anti-virus, AV, meterpreter, meterpreter vs. antivirus

Three Simple Disguises for Evading Antivirus

Logan Lembke // Antivirus has been a key component in defending computer systems since the 1990s. Over the years, antivirus began to dominate the discussion of PC security with other […]

Read the entire post here
Question:  What Can I Learn from Password Spraying a 2FA Microsoft Web App Portal?

External/Internal, Red Team 2 factor authentication, 2FA, fun fun fun, MFA, Microsoft, Microsoft Web App Portal, password spraying, passwords

Question:  What Can I Learn from Password Spraying a 2FA Microsoft Web App Portal?

Carrie Roberts // Answer: Enough to make it worth it! Penetration testers love to perform password spraying attacks against publicly available email portals as described here in this great post by Beau Bullock. […]

Read the entire post here
Lawrence Hoffman

News backdoor, font fuzzing, NSA, random number generator, RSA

Lawrence’s List 070116

Lawrence Hoffman // As I previously mentioned I’m on vacation this week and next. As I like to go for long cross-country drives I’ve not had much time to keep […]

Read the entire post here
employee js 1

Author, InfoSec 101, John Strand, News customers, infosec, leadership, Management, Patagonia, people over profit, vested interest

A Letter from John

John Strand // Last week BHIS took a new direction as a company. (Warning, this blog is not technical. But it is important.) In the past few years we’ve grown […]

Read the entire post here
Juniper Two Factor VPN & Linux

Author, David Fletcher, External/Internal, Red Team Juniper, SSL, SSL VPN concentrator, VPN

Juniper Two Factor VPN & Linux

David Fletcher // On a recent internal penetration test engagement, I was faced with using a Juniper VPN to access the target network. One small problem, Juniper does not formally […]

Read the entire post here

News GoToMyPC, iOS10, Linux Kernel, PyCon2016, UDP, unencrypted kernel

Lawrence’s List 062416

This week is going to be sort of short. I get to go on vacation! I’ll still be trying to do some minimal posts during the next two weeks, but […]

Read the entire post here

Author, Blue Team, Blue Team Tools, Ethan Robish, Red Team, Red Team Tools Linux, ssh config files, SSH configs

SSH Config Files

Ethan Robish // Here’s a short intro for anyone not familiar with ssh config files, which are usually located at ~/.ssh/config As an example, you have ssh running on port […]

Read the entire post here
Book Review: “Red Team – How to Succeed by Thinking Like the Enemy”

Author, Brian King, InfoSec 101, Red Team kitchen remodel, pen-testing, penetration testing, pentest, Pentesting, Red Team, red team your life, red teaming

Book Review: “Red Team – How to Succeed by Thinking Like the Enemy”

Brian B. King // Red Teaming is one of those terms popping up all over the place lately, and it seems to mean different things to different people. Is it […]

Read the entire post here
«‹ 70 71 72 73›»

Looking For Something?

Browse by category

Recent Posts

  • smart goals_header (1)How to Set Smart Goals (That Actually Work For You)
    Setting goals is a deceptively simple career skill we
  • socinterview_headerInside the BHIS SOC: A Conversation with Hayden Covington 
    What happens when you ditch the tiered ticket queues
  • del3_headerAbusing Delegation with Impacket (Part 3): Resource-Based Constrained Delegation
    This is the third in a three-part series of blog posts

Browse by topic

Active Directory ADHD AI anti-virus Attack Tactics AV Beau Bullock BHIS Blue Team C2 Carrie Roberts cloud Cyber Deception hacking Hashcat infosec Infosec for Beginners InfoSec Survival Guide Joff Thyer john strand Jordan Drysdale Kent Ickler Kerberos Linux MailSniper Microsoft Nessus Nmap passwords password spraying pen-testing penetration testing pentest Pentesting phishing PowerShell Python Red Team red teaming RITA Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security, Inc.

890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008


About Us | BHIS Tribe of Companies | Privacy Policy | Contact

Links
Search the site