Black Hills Information Security, Inc.
RSS
  • About Us
    • Security Analysts
    • Admin
    • SOC Team
    • Interns
    • BHIS Family of Companies
  • Contact
    • Contact Us
    • Email Sign-Up
  • Services
    • Complete Service Guide
    • Active SOC
    • AI Security Assessments
    • Blockchain Security
    • Blue Team Services
    • Continuous Penetration Testing
    • High-Profile Risk Assessments
    • Incident Response
    • Penetration Testing
  • Tools
    • All Tools
    • RITA
    • Books
    • REKCAH
  • Learn
    • Backdoors & Breaches
    • Blogs
    • Podcasts
    • PROMPT# Zine
    • Webcasts
  • Community
    • Discord
    • LinkedIn
    • T-Shirts & Hoodies
    • Twitter
    • Upcoming Events
    • YouTube
  • Training
  • WWHF
Warning: This Post Contains Macros

How-To, InfoSec 101 Average User, BlackEnergy, Education, macros, MS Office, Ukraine

Warning: This Post Contains Macros

Lisa Woody // On the 23rd of December, a cyber attack left hundreds of thousands of people in the Ukrainian region of Ivano-Frankivsk without power. This was the first confirmed […]

Read the entire post here
Let’s Talk About Direct Object References

Red Team, Web App Direct Object References, HIPAA, HIPAA violations, user profiles, XKCD

Let’s Talk About Direct Object References

Kelsey Bellew // Maybe you don’t know what Direct Object References mean, if you Google it, you’d get this: This description uses the words “direct”, “object” and “reference” to describe a […]

Read the entire post here
Beware Public Wi-Fi Insecurity – Part 1: Reviewing the Neighborhood

Author, General InfoSec Tips & Tricks, InfoSec 101, Jordan Drysdale free wifi, the dangers of public wifi, wifi

Beware Public Wi-Fi Insecurity – Part 1: Reviewing the Neighborhood

Jordan Drysdale // Our community’s downtown district is approximately a five block by four block area. There are art stores, toy shops, candy retailers, restaurants, bars and hotels. Significant investment […]

Read the entire post here
Hacking Like It’s 1999

Blue Team, How-To, Hunt Teaming hacking, old scripts, old stuff

Hacking Like It’s 1999

Lawrence Hoffman // Last week a friend stopped by my desk with a worried look on his face. He knelt down and showed me the screen of his laptop where […]

Read the entire post here
Why The Hate for Threat Intelligence Feeds?

Author, InfoSec 101, John Strand

Why The Hate for Threat Intelligence Feeds?

John Strand // Recently on an episode of Security Weekly, I lost my mind on threat intelligence feeds.  I feel just a bit bad about it. Right Apollo? But…  I […]

Read the entire post here

Author, Brian Fehrman, External/Internal, Phishing, Red Team email filters, empire macros, modifying empire macros

How To Modify Empire Macro to Bypass Mail Filters

Brian Fehrman //

Read the entire post here
Pentesting with Linked Clones

Author, Brian King, How-To, InfoSec 101 linked clones, Pentesting, virtual machine, VM

Pentesting with Linked Clones

Brian B. King // If working with several customers at once, or in succession, it would be easy to lose track of whose data you’re looking at, or to include […]

Read the entire post here
75fce7_17bef76f115246d593e62f14d349b4ae

External/Internal, Red Team encryption, mimikatz, passwords

Your Password Is… wait for it… NOT Always Encrypted

Sally Vandeven // As pentesters we LOVE passwords – they come in all shapes and sizes. A good password has 16+ characters and a mix of case, digits and special […]

Read the entire post here
75fce7_d032220af42e4aa98bc83e3cc00aa79f

Physical, Red Team hacking RFID, RFID

RFID Replaying with the Proxmarx3

Rick Wisser //  Ohhh Who Says Tree’s are not Interesting RFID’s (Radio-Frequency Identification) have been around for a while now and are utilized for Inventory tracking/control, retail, clothing, animal tracking, […]

Read the entire post here
«‹ 72 73 74 75›

Follow Us

Looking For Something?

Browse by category

Recent Posts

  • copilotbronwen_headerCaging Copilot: Lessons Learned in LLM Security
    For those of us in cybersecurity, there are a lot of
  • copilot_headerAugmenting Penetration Testing Methodology with Artificial Intelligence – Part 2: Copilot
    A common use case for LLMs is rapid software
  • burpference_headerAugmenting Penetration Testing Methodology with Artificial Intelligence – Part 1: Burpference
    Burpference is a Burp Suite plugin that takes requests

Browse by topic

Active Directory ADHD AI anti-virus Attack Tactics AV Beau Bullock BHIS Blue Team bypassing AV C2 Carrie Roberts cloud Cyber Deception encryption hacking infosec Infosec for Beginners Joff Thyer john strand Jordan Drysdale Kent Ickler Linux MailSniper Microsoft Nessus passwords password spraying pen-testing penetration testing pentest Pentesting phishing podcast PowerShell Python Raymond Felch Red Team red teaming RITA Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security, Inc.

890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008-2024


About Us | BHIS Tribe of Companies | Privacy Policy | Contact

Links
Search the site