Black Hills Information Security, Inc.
RSS
  • All Services
    • Complete Service Guide
    • Active SOC
    • AI Security Assessments
    • Blockchain Security
    • Blue Team Services
    • Continuous Penetration Testing
    • High-Profile Risk Assessments
    • Incident Response
    • Penetration Testing
  • Contact Us
    • Contact Us
    • Email Sign-Up
  • About Us
    • Security Consultants
    • Admin Team
    • Active SOC Team
    • Antisyphon Training
    • BHIS Tribe of Companies
  • Free Resources
    • Blogs
    • Free Cybersecurity Tools
    • Free Cybersecurity Webcasts
    • Podcasts
    • RITA
  • Training
    • BHIS & Antisyphon Training
    • WWHF Conference
  • Community
    • Discord
    • LinkedIn
    • YouTube
    • Bluesky
    • Twitter/X
    • Upcoming Events
  • Fun Stuff
    • Backdoors & Breaches
    • Merch, Zines & More
    • PROMPT# Zine
    • REKCAH
    • Books
Juniper Two Factor VPN & Linux

Author, David Fletcher, External/Internal, Red Team Juniper, SSL, SSL VPN concentrator, VPN

Juniper Two Factor VPN & Linux

David Fletcher // On a recent internal penetration test engagement, I was faced with using a Juniper VPN to access the target network. One small problem, Juniper does not formally […]

Read the entire post here

News GoToMyPC, iOS10, Linux Kernel, PyCon2016, UDP, unencrypted kernel

Lawrence’s List 062416

This week is going to be sort of short. I get to go on vacation! I’ll still be trying to do some minimal posts during the next two weeks, but […]

Read the entire post here

Author, Blue Team, Blue Team Tools, Ethan Robish, Red Team, Red Team Tools Linux, ssh config files, SSH configs

SSH Config Files

Ethan Robish // Here’s a short intro for anyone not familiar with ssh config files, which are usually located at ~/.ssh/config As an example, you have ssh running on port […]

Read the entire post here
Book Review: “Red Team – How to Succeed by Thinking Like the Enemy”

Author, Brian King, InfoSec 101, Red Team kitchen remodel, pen-testing, penetration testing, pentest, Pentesting, Red Team, red team your life, red teaming

Book Review: “Red Team – How to Succeed by Thinking Like the Enemy”

Brian B. King // Red Teaming is one of those terms popping up all over the place lately, and it seems to mean different things to different people. Is it […]

Read the entire post here

News everything on the internet is true, Guccifer 2.0, hype it's all hype, Julian Assange, Management Engine, Net Neutrality, Photomniner

Lawrence’s List 061716

Lawrence Hoffman // Certain Intel chips come with what’s called a “Management Engine” or ME. This is an actual physical subsystem which implements Intel’s Active Management Technology (AMT.) Why is […]

Read the entire post here
The Most Interesting Man In The World - I Dont always use Bitlocker But when I do It

InfoSec 301, Robert Schwass bitlocker, hacking, Microsoft, ransomeware, Windows 10

Bitlocker Ransomware: Using BitLocker for Nefarious Reasons

Editor’s Note: We’re excited to publish our first guest post!  If you’d like to guest post on our blog DM us on Twitter, or use our contact form to contact us […]

Read the entire post here
35439548

Author, Brian Fehrman, External/Internal, Password Spray, Red Team domain admin, local admin testing, password, password spraying

Wide-Spread Local Admin Testing

Brian Fehrman // In our experience, we see many Windows environments in which the local Administrator password is the same for many machines. We refer to this as Wide-Spread Local […]

Read the entire post here
G&L

News bad passwords, bsides, CII, CII best practice badge, CONs, domain typo squatting, infosec cons, IoT, Lawrence's List, password fails, passwords, reverse engineering

Lawrence’s List 061016

Lawrence Hoffman // It’s been one of those crazy busy weeks. I always feel like I didn’t get enough time to read articles, surf Reddit, and attempt to keep up […]

Read the entire post here
Are you Snoopable?!

Blue Team DNS, DNS cache snooping, Nmap, Snooping

Are you Snoopable?!

Rick Wisser // All right, you’ve taken all the precautions related to your network. You have lockout controls in place, you use awesome password policies (20 characters with uppercase, lowercase, […]

Read the entire post here
«‹ 72 73 74 75›»

Looking For Something?

Browse by category

Recent Posts

  • Lessons from a chatbot incidentLessons From A Chatbot Incident
    Real-world account of how insecure databases and an AI
  • How To Lead Effective Cybersecurity TabletopsHow to Lead Effective Tabletops
    Learn how to transform boring, meeting-style security
  • grc_header (1)Understanding GRC: How to Navigate Risks and Compliance Standards
    “GRC” isn’t all witchcraft and administrative

Browse by topic

Active Directory ADHD AI anti-virus Attack Tactics AV Beau Bullock BHIS Blue Team C2 Carrie Roberts cloud Cyber Deception hacking infosec Infosec for Beginners InfoSec Survival Guide Joff Thyer john strand Jordan Drysdale Kent Ickler Kerberos Linux MailSniper Malware Microsoft Nessus Nmap passwords password spraying pen-testing penetration testing pentest Pentesting phishing PowerShell Python Red Team red teaming RITA Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security, Inc.

890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008


About Us | BHIS Tribe of Companies | Privacy Policy | Contact

Links
Search the site