Black Hills Information Security, Inc.
RSS
  • All Services
    • Complete Service Guide
    • Active SOC
    • AI Security Assessments
    • Blockchain Security
    • Blue Team Services
    • Continuous Penetration Testing
    • High-Profile Risk Assessments
    • Incident Response
    • Penetration Testing
  • Contact Us
    • Contact Us
    • Email Sign-Up
  • About Us
    • Security Consultants
    • Admin
    • SOC Team
    • Antisyphon Training
    • BHIS Tribe of Companies
  • Free Resources
    • Blogs
    • Free Cybersecurity Tools
    • Free Cybersecurity Webcasts
    • Podcasts
    • RITA
  • Training
    • BHIS & Antisyphon Training
    • WWHF Conference
  • Community
    • Discord
    • LinkedIn
    • YouTube
    • Bluesky
    • Twitter/X
    • Upcoming Events
  • Fun Stuff
    • Backdoors & Breaches
    • Merch, Zines & More
    • PROMPT# Zine
    • REKCAH
    • Books

General InfoSec Tips & Tricks, InfoSec 101 be careful whom you trust, con artistry, crying babies, pen-testing, penetration testing, people are kind, people are naive, phishing, scamming, social engineering, trust

The Easiest Con – Hacking the Human & 9 Tips to Avoid Social Engineering

Heather Doerges // Of all the services we offer at BHIS, Social Engineering is the most interesting to me. It’s something (and quite possibly the only thing) I completely understand […]

Read the entire post here
Storm Chasing: How We Hacked Your Cloud

Author, Beau Bullock, External/Internal, Red Team cloud, Cloud computing, hack a cloud, hacking clouds, Pentesting, storm chasing

Storm Chasing: How We Hacked Your Cloud

Beau Bullock // Overview The traditional methodology of a remote attacker who has no preconceptions of a target network used to be fairly static. With organizations moving to “the cloud”, […]

Read the entire post here
You Down With APP? (Yeah You Know Me)

Author, Derek Banks, General InfoSec Tips & Tricks, InfoSec 201 anonymous, Any job that involves a burner phone is a great job, cash, hacking, nuke it all afterwards, red teaming, white hat hacking

You Down With APP? (Yeah You Know Me)

Derek Banks // Yes, I date myself with reference in the title of this blog post.  I can be lame like that. A fair amount of my time at $last_gig […]

Read the entire post here
The Rejected Box – An Ode to IT Professionals

Fun & Games building a cabin in the woods, IT people are awesome, John's grunge hair, John's sister, rotting animals in a well, Thinking outside the box, throwback family posts

The Rejected Box – An Ode to IT Professionals

Melisa Wachs // Hello IT professional.  If you haven’t heard it lately, I hope you know that you’re really amazing. You’re probably helping “laymen” like me all day long. Maybe […]

Read the entire post here
Nessus & Nmap

Red Team, Red Team Tools Nessus, Nmap

Nessus & Nmap

Sally Vandeven // In a recent conversation with Paul Asadoorian, he mentioned a Nessus plugin called nmapxml.  He was not sure how well it worked but suggested I try it […]

Read the entire post here
Phishing with PowerPoint

Carrie Roberts, Phishing, Red Team autorun, penetration testing, pentest, Pentesting, phishing, social engineering

Phishing with PowerPoint

Carrie Roberts & Chevy Swanson // How do we make sure people open up our malicious files and execute them? We simply let Microsoft work for years and years to gain […]

Read the entire post here
What’s trust among schoolchildren: Kerberos Authentication Explained

InfoSec 201 3 headed dog from gates of hell, authentication protocol, first crush, handwritten notes, Kerberos, kerberos authentication, Windows Active Directory

What’s trust among schoolchildren: Kerberos Authentication Explained

Logan Lembke // Kerberos authentication can be daunting but is an important protocol to understand for any IT professional, and especially important in the field of information security. While you […]

Read the entire post here
Browser Plugin Oversharing

Author, Brian King, InfoSec 201 browser plug-ins, browsers, privacy, security, they're watching, wappalyzer

Browser Plugin Oversharing

Brian King //   Do you know what that browser plugin is doing? There’s a browser plugin for just about everything. You can find one to change the name of […]

Read the entire post here
00061_05102016_AdvancedMsfvenomPayloadGeneration2

Author, Joff Thyer, Red Team KALI, payload generation, PEInsider, PowerShell, shellcode

Advanced Msfvenom Payload Generation

Joff Thyer // It has been known for some time that an executable payload generated with msfvenom can leverage an alternative template EXE file, and be encoded to better evade […]

Read the entire post here
«‹ 72 73 74 75›»

Looking For Something?

Browse by category

Recent Posts

  • deceptiveaud_header (2)Deceptive-Auditing: An Active Directory Honeypots Tool
    Deceptive-Auditing is a tool that deploys Active
  • The Curious Case of the ComburglarThe Curious Case of the Comburglar
    By Troy Wojewoda During a recent Breach Assessment
  • smart goals_header (1)How to Set Smart Goals (That Actually Work For You)
    Setting goals is a deceptively simple career skill we

Browse by topic

Active Directory ADHD AI anti-virus Attack Tactics AV Beau Bullock BHIS Blue Team C2 Carrie Roberts cloud Cyber Deception hacking Hashcat infosec Infosec for Beginners InfoSec Survival Guide Joff Thyer john strand Jordan Drysdale Kent Ickler Kerberos Linux MailSniper Microsoft Nessus Nmap passwords password spraying pen-testing penetration testing pentest Pentesting phishing PowerShell Python Red Team red teaming RITA Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security, Inc.

890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008


About Us | BHIS Tribe of Companies | Privacy Policy | Contact

Links
Search the site