Black Hills Information Security, Inc.
RSS
  • All Services
    • Complete Service Guide
    • Active SOC
    • AI Security Assessments
    • Blockchain Security
    • Blue Team Services
    • Continuous Penetration Testing
    • High-Profile Risk Assessments
    • Incident Response
    • Penetration Testing
  • Contact Us
    • Contact Us
    • Email Sign-Up
  • About Us
    • Security Consultants
    • Admin Team
    • Active SOC Team
    • Antisyphon Training
    • BHIS Tribe of Companies
  • Free Resources
    • Blogs
    • Free Cybersecurity Tools
    • Free Cybersecurity Webcasts
    • Podcasts
    • RITA
  • Training
    • BHIS & Antisyphon Training
    • WWHF Conference
  • Community
    • Discord
    • LinkedIn
    • YouTube
    • Bluesky
    • Twitter/X
    • Upcoming Events
  • Fun Stuff
    • Backdoors & Breaches
    • Merch, Zines & More
    • PROMPT# Zine
    • REKCAH
    • Books
66619265

C2, Red Team building, C2, http 404, network traffic

How to Build a 404 page not found C2

A Guest blog by Matthew Pawelski // A C2, or command-and-control, is used by attackers to control compromised systems. Most of these C2s are in control of large botnets, yet […]

Read the entire post here
employee_sc

InfoSec 201 anonymization, aol, data mining, facial recognition, netflix, personal data, pokemon go, privacy, social security

Data Mining & Privacy: How Anonymous Are You Really?

Sam Carroll // When I started at BHIS I was surprised at the sensitivity of personal data, such as my birthday. I was soon reminded of a data mining class […]

Read the entire post here
Lawrence Hoffman

News AWS, BSidesPhilly, Linus, Linux, MIT, printer attacks, printer drivers, Riffle

Lawrence’s List 071516

Lawrence Hoffman // Hey, I’m back! Vacation was great. I spent part of last week on an Island so I was unable to scratch the keep-up-with-the-media itch. Now that I’m […]

Read the entire post here

Fun & Games

Get to Know a Tester: Sally

Note: A few months ago we did a short interview with a tester when we talked to Ethan.  This month we had a conversation with Sally Vandeven, who’s only been […]

Read the entire post here
employee jd 5

Author, Blue Team, Blue Team Tools, Jordan Drysdale ansible, Ansible Galaxy, Linux

Securing Your Way to Restful Sleep with Ansible Galaxy

Jordan Drysdale //   Life as a ‘blue-teamer’ can often be a stressful experience. Working in an environment with a strong Linux infrastructure  can help some, but Ansible  can help […]

Read the entire post here
Three Simple Disguises for Evading Antivirus

Red Team 64-bit, anti-virus, AV, meterpreter, meterpreter vs. antivirus

Three Simple Disguises for Evading Antivirus

Logan Lembke // Antivirus has been a key component in defending computer systems since the 1990s. Over the years, antivirus began to dominate the discussion of PC security with other […]

Read the entire post here
Question:  What Can I Learn from Password Spraying a 2FA Microsoft Web App Portal?

External/Internal, Red Team 2 factor authentication, 2FA, fun fun fun, MFA, Microsoft, Microsoft Web App Portal, password spraying, passwords

Question:  What Can I Learn from Password Spraying a 2FA Microsoft Web App Portal?

Carrie Roberts // Answer: Enough to make it worth it! Penetration testers love to perform password spraying attacks against publicly available email portals as described here in this great post by Beau Bullock. […]

Read the entire post here
Lawrence Hoffman

News backdoor, font fuzzing, NSA, random number generator, RSA

Lawrence’s List 070116

Lawrence Hoffman // As I previously mentioned I’m on vacation this week and next. As I like to go for long cross-country drives I’ve not had much time to keep […]

Read the entire post here
employee js 1

Author, InfoSec 101, John Strand, News customers, infosec, leadership, Management, Patagonia, people over profit, vested interest

A Letter from John

John Strand // Last week BHIS took a new direction as a company. (Warning, this blog is not technical. But it is important.) In the past few years we’ve grown […]

Read the entire post here
«‹ 71 72 73 74›»

Looking For Something?

Browse by category

Recent Posts

  • Lessons from a chatbot incidentLessons From A Chatbot Incident
    Real-world account of how insecure databases and an AI
  • How To Lead Effective Cybersecurity TabletopsHow to Lead Effective Tabletops
    Learn how to transform boring, meeting-style security
  • grc_header (1)Understanding GRC: How to Navigate Risks and Compliance Standards
    “GRC” isn’t all witchcraft and administrative

Browse by topic

Active Directory ADHD AI anti-virus Attack Tactics AV Beau Bullock BHIS Blue Team C2 Carrie Roberts cloud Cyber Deception hacking infosec Infosec for Beginners InfoSec Survival Guide Joff Thyer john strand Jordan Drysdale Kent Ickler Kerberos Linux MailSniper Malware Microsoft Nessus Nmap passwords password spraying pen-testing penetration testing pentest Pentesting phishing PowerShell Python Red Team red teaming RITA Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security, Inc.

890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008


About Us | BHIS Tribe of Companies | Privacy Policy | Contact

Links
Search the site