Black Hills Information Security, Inc.
RSS
  • All Services
    • Complete Service Guide
    • Active SOC
    • AI Security Assessments
    • Blockchain Security
    • Blue Team Services
    • Continuous Penetration Testing
    • High-Profile Risk Assessments
    • Incident Response
    • Penetration Testing
  • Contact Us
    • Contact Us
    • Email Sign-Up
  • About Us
    • Security Consultants
    • Admin Team
    • Active SOC Team
    • Antisyphon Training
    • BHIS Tribe of Companies
  • Free Resources
    • Blogs
    • Free Cybersecurity Tools
    • Free Cybersecurity Webcasts
    • Podcasts
    • RITA
  • Training
    • BHIS & Antisyphon Training
    • WWHF Conference
  • Community
    • Discord
    • LinkedIn
    • YouTube
    • Bluesky
    • Twitter/X
    • Upcoming Events
  • Fun Stuff
    • Backdoors & Breaches
    • Merch, Zines & More
    • PROMPT# Zine
    • REKCAH
    • Books
Phishing with PowerPoint

Carrie Roberts, Phishing, Red Team autorun, penetration testing, pentest, Pentesting, phishing, social engineering

Phishing with PowerPoint

Carrie Roberts & Chevy Swanson // How do we make sure people open up our malicious files and execute them? We simply let Microsoft work for years and years to gain […]

Read the entire post here
What’s trust among schoolchildren: Kerberos Authentication Explained

InfoSec 201 3 headed dog from gates of hell, authentication protocol, first crush, handwritten notes, Kerberos, kerberos authentication, Windows Active Directory

What’s trust among schoolchildren: Kerberos Authentication Explained

Logan Lembke // Kerberos authentication can be daunting but is an important protocol to understand for any IT professional, and especially important in the field of information security. While you […]

Read the entire post here
Browser Plugin Oversharing

Author, Brian King, InfoSec 201 browser plug-ins, browsers, privacy, security, they're watching, wappalyzer

Browser Plugin Oversharing

Brian King //   Do you know what that browser plugin is doing? There’s a browser plugin for just about everything. You can find one to change the name of […]

Read the entire post here
00061_05102016_AdvancedMsfvenomPayloadGeneration2

Author, Joff Thyer, Red Team KALI, payload generation, PEInsider, PowerShell, shellcode

Advanced Msfvenom Payload Generation

Joff Thyer // It has been known for some time that an executable payload generated with msfvenom can leverage an alternative template EXE file, and be encoded to better evade […]

Read the entire post here
15 Ways to Be a Safer Computer User

General InfoSec Tips & Tricks, InfoSec 101 basic stuff, dark alleys, internet safety, listicles, safe computer usage, tips for your mom, your mom

15 Ways to Be a Safer Computer User

Sierra Ward // Editor’s note: Though infosec professionals may see this advice as basic to the point of being obvious, as we visit with people and interact with swaths of other […]

Read the entire post here
Ansible for Lazy Admins

Author, Blue Team, Blue Team Tools, Jordan Drysdale ansible, Config management, CSC #2, lazy admin

Ansible for Lazy Admins

Jordan Drysdale // For the lazy server and system admins, automating those boring functions of updating packages, finding outdated ones, checking scans, et cetera, Ansible has some very nice features. […]

Read the entire post here
Mailvelope_mail_locked_icon.svg

General InfoSec Tips & Tricks, InfoSec 201 encrypted email, encryption, gpg, mailvelope, passphrase, pgp codes, thunderbird

5 Reasons for Mailvelope & Easy Instructions

Gail Menius // My husband set me up with GPG and Thunderbird and it was too hard. Ethan said it was cool. Lots of people gave it good reviews. It’s […]

Read the entire post here
TestSSL.sh –Assessing SSL/TLS Configurations at Scale

Author, David Fletcher, External/Internal, Red Team cool stuff, shell script, SSL, testssl.sh, TLS, tools

TestSSL.sh –Assessing SSL/TLS Configurations at Scale

David Fletcher // Have you ever looked at Nessus scan results to find the below in the output? Recently I was on engagement and encountered just this situation.  I found […]

Read the entire post here
00056_04252016_InternalPivotNetwork2

Author, External/Internal, Joff Thyer, Red Team C2, internal pentest, ipconfig, ipconfig Output, l33t ninja, metasploit, pen-testing, Pentesting

Internal Pivot, Network Enumeration, & Lateral Movement

Joff Thyer // Picture a scenario whereby you are involved in an internal network penetration test. Perhaps you have succeeded with a spear-phishing campaign and landed on an internal system, […]

Read the entire post here
«‹ 74 75 76 77›»

Looking For Something?

Browse by category

Recent Posts

  • Getting Started in PentestingGetting Started In Pentesting – Advice From The BHIS Pentest Lead
    Advice about getting started in pentesting from the
  • Tips and Resources for Securing the CloudCloud Security: Tips and Resources for Securing the Cloud
    This overview of the basics of Cloud Security includes
  • Lessons from a chatbot incidentLessons From A Chatbot Incident
    Real-world account of how insecure databases and an AI

Browse by topic

Active Directory ADHD AI anti-virus Attack Tactics AV Beau Bullock BHIS Blue Team C2 Carrie Roberts cloud Cyber Deception hacking infosec Infosec for Beginners InfoSec Survival Guide Joff Thyer john strand Jordan Drysdale Kent Ickler Kerberos Linux MailSniper Malware Microsoft Nessus Nmap passwords password spraying pen-testing penetration testing pentest Pentesting phishing PowerShell Python Red Team red teaming RITA Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security, Inc.

890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008


About Us | BHIS Tribe of Companies | Privacy Policy | Contact

Links
Search the site