Black Hills Information Security, Inc.
RSS
  • About Us
    • Security Analysts
    • Admin
    • SOC Team
    • Interns
    • BHIS Family of Companies
  • Contact
    • Contact Us
    • Email Sign-Up
  • Services
    • Complete Service Guide
    • Active SOC
    • AI Security Assessments
    • Blockchain Security
    • Blue Team Services
    • Continuous Penetration Testing
    • High-Profile Risk Assessments
    • Incident Response
    • Penetration Testing
  • Tools
    • Free Cybersecurity Tools
    • RITA
    • REKCAH
  • Learn
    • Backdoors & Breaches
    • Blogs
    • Free Cybersecurity Webcasts
    • Podcasts
    • PROMPT# Zine
    • Books
  • Community
    • Discord
    • LinkedIn
    • T-Shirts & Hoodies
    • Twitter
    • Upcoming Events
    • YouTube
  • Training
  • WWHF
00030_02182016_HowToTestForOpenMailRelays(2)

External/Internal, Red Team Carrie Roberts, external network assessment, mail relays, mail servers, pen-testing, penetration testing, Pentesting, testing for open mail relays

How to Test for Open Mail Relays

Carrie Roberts // *Guest Blog It is important to ensure that your external mail servers are properly configured to not support open relaying of mail. An open mail relay can […]

Read the entire post here
00029_02172016_PasswordSpraying2

Author, Beau Bullock, Recon, Red Team domain credentials, domain creds, password spraying, passwords

Password Spraying Outlook Web Access – How to Gain Access to Domain Credentials Without Being on a Target’s Network: Part 2

Beau Bullock // This is part two of a series of posts (See part 1 here) where I am detailing multiple ways to gain access to domain user credentials without ever being […]

Read the entire post here
75fce7_64d0f839ad00414d94c8de7e559117e8

Author, Beau Bullock, External/Internal, Password Spray, Red Team domain creds, exploiting passwords, gaining access to domain credentials, passwords, reusing passwords

Exploiting Password Reuse on Personal Accounts: How to Gain Access to Domain Credentials Without Being on a Target’s Network: Part 1

Beau Bullock // In this series of posts I am going to detail multiple ways to gain access to domain user credentials without ever being on a target organization’s network. […]

Read the entire post here
Warning: This Post Contains Macros

How-To, InfoSec 101 Average User, BlackEnergy, Education, macros, MS Office, Ukraine

Warning: This Post Contains Macros

Lisa Woody // On the 23rd of December, a cyber attack left hundreds of thousands of people in the Ukrainian region of Ivano-Frankivsk without power. This was the first confirmed […]

Read the entire post here
Let’s Talk About Direct Object References

Red Team, Web App Direct Object References, HIPAA, HIPAA violations, user profiles, XKCD

Let’s Talk About Direct Object References

Kelsey Bellew // Maybe you don’t know what Direct Object References mean, if you Google it, you’d get this: This description uses the words “direct”, “object” and “reference” to describe a […]

Read the entire post here
Beware Public Wi-Fi Insecurity – Part 1: Reviewing the Neighborhood

Author, General InfoSec Tips & Tricks, InfoSec 101, Jordan Drysdale free wifi, the dangers of public wifi, wifi

Beware Public Wi-Fi Insecurity – Part 1: Reviewing the Neighborhood

Jordan Drysdale // Our community’s downtown district is approximately a five block by four block area. There are art stores, toy shops, candy retailers, restaurants, bars and hotels. Significant investment […]

Read the entire post here
Hacking Like It’s 1999

Blue Team, How-To, Hunt Teaming hacking, old scripts, old stuff

Hacking Like It’s 1999

Lawrence Hoffman // Last week a friend stopped by my desk with a worried look on his face. He knelt down and showed me the screen of his laptop where […]

Read the entire post here
Why The Hate for Threat Intelligence Feeds?

Author, InfoSec 101, John Strand

Why The Hate for Threat Intelligence Feeds?

John Strand // Recently on an episode of Security Weekly, I lost my mind on threat intelligence feeds.  I feel just a bit bad about it. Right Apollo? But…  I […]

Read the entire post here

Author, Brian Fehrman, External/Internal, Phishing, Red Team email filters, empire macros, modifying empire macros

How To Modify Empire Macro to Bypass Mail Filters

Brian Fehrman //

Read the entire post here
«‹ 72 73 74 75›

Looking For Something?

Browse by category

Recent Posts

  • s4u2self_headerAbusing S4U2Self for Active Directory Pivoting
    TL;DR If you only have access to a valid machine hash,
  • macropad_headerWhy Use a Macro Pad?
    Compression is everywhere—in files, videos, storage,
  • espanso_header (1)Espanso: Text Replacement, the Easy Way
    Espanso is a powerful cross-platform and open-source

Browse by topic

Active Directory ADHD AI anti-virus Attack Tactics AV Beau Bullock BHIS Blue Team bypassing AV C2 Carrie Roberts cloud Cyber Deception encryption hacking infosec Infosec for Beginners Joff Thyer john strand Jordan Drysdale Kent Ickler Linux MailSniper Microsoft Nessus passwords password spraying pen-testing penetration testing pentest Pentesting phishing podcast PowerShell Python Raymond Felch Red Team red teaming RITA Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security, Inc.

890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008-2024


About Us | BHIS Tribe of Companies | Privacy Policy | Contact

Links
Search the site