Black Hills Information Security, Inc.
RSS
  • All Services
    • Complete Service Guide
    • Active SOC
    • AI Security Assessments
    • Blockchain Security
    • Blue Team Services
    • Continuous Penetration Testing
    • High-Profile Risk Assessments
    • Incident Response
    • Penetration Testing
  • Contact Us
    • Contact Us
    • Email Sign-Up
  • About Us
    • Security Consultants
    • Admin
    • SOC Team
    • BHIS Family of Companies
  • Free Resources
    • Blogs
    • Free Cybersecurity Tools
    • Free Cybersecurity Webcasts
    • Podcasts
    • RITA
  • Training
    • BHIS & Antisyphon Training
    • WWHF Conference
  • Online Community
    • Discord
    • LinkedIn
    • YouTube
    • Bluesky
    • Twitter/X
    • Upcoming Events
  • Fun Stuff
    • Backdoors & Breaches
    • Merch, Zines & More
    • PROMPT# Zine
    • REKCAH
    • Books
That One Time My Parents Were Hacked

General InfoSec Tips & Tricks, InfoSec 101 bad tech support, canon, family, mistakes, ransomeware, Spyware, tech support

That One Time My Parents Were Hacked

Heather Doerges // My mom called the other day. It started out, “Honestly, your father.” Which, isn’t a strange way for her to start a conversation about my dad. “What […]

Read the entire post here
00038_03092016_TLSCertificates2

Author, Blue Team, Blue Team Tools, Joff Thyer, Red Team, Red Team Tools EAP Network, TSL Certificates

TLS Certificates from EAP Network Traffic

Joff Thyer // A network can authenticate a client workstation using the 802.1X and Extensible Authentication Protocol (EAP) using multiple different methods.  EAP is used both in a wired network […]

Read the entire post here
Using Recursive Grep to Test Per-Request CSRF-Token Protected Pages

David Fletcher, Red Team, Web App Cross-Site Request Forgery, CSRF, CSRF-Token, Recursive Grep, Testing Protected Pages, XSRF

Using Recursive Grep to Test Per-Request CSRF-Token Protected Pages

David Fletcher // Cross-Site Request Forgery (CSRF or XSRF) is an attack which is used to execute a transaction on behalf of a victim user against a vulnerable web application. […]

Read the entire post here
00036_03042016_HowToCreateSOHORouter2

Author, How-To, Joff Thyer soho router, ubuntu linux

How to create a SOHO router using Ubuntu Linux

Joff Thyer // This post is cross-posted from Packet Header on 3/1/16. __________   On Security Weekly Episode 452, I presented a technical segment on how to build your own […]

Read the entire post here
More on Threat Intelligence Feeds

Author, Derek Banks, InfoSec 101 Purple Team, threat intelligence feeds

More on Threat Intelligence Feeds

Derek Banks // John’s hating on threat intelligence feeds post got me thinking.  As a former blue team member that is now solidly purple team, I do not hate threat intelligence […]

Read the entire post here
Check\ Your\ Tools

Author, Brian King, Password Spray, Red Team bad passwords, password, passwords

Check\ Your\ Tools

Brian King // There’s a one-liner password spray script that a lot of folks use to see if anyone on a domain is using a bad password like LetMeIn! or […]

Read the entire post here
Check Your Image

How-To Image, Linux, Linux Mint, Vulnerabilites

Check Your Image

Lawrence Hoffman // Today I’ll walk through the process I use to verify ISO images before I install them. If you downloaded Linux Mint 17.3 Cinnamon on February 20th there’s […]

Read the entire post here
EyeWitness and Why It Rocks

Author, Brian Fehrman, External/Internal, Red Team EyeWitness, Pentesting, vulnerability scans

EyeWitness and Why It Rocks

Brian Fehrman // External and Internal vulnerability scans are often part of any penetration test. Automated scanning tools, however, can’t always find the “good stuff.” Many times, some of the […]

Read the entire post here
00030_02182016_HowToTestForOpenMailRelays(2)

External/Internal, Red Team Carrie Roberts, external network assessment, mail relays, mail servers, pen-testing, penetration testing, Pentesting, testing for open mail relays

How to Test for Open Mail Relays

Carrie Roberts // *Guest Blog It is important to ensure that your external mail servers are properly configured to not support open relaying of mail. An open mail relay can […]

Read the entire post here
«‹ 75 76 77 78›»

Looking For Something?

Browse by category

Recent Posts

  • socinterview_headerInside the BHIS SOC: A Conversation with Hayden Covington 
    What happens when you ditch the tiered ticket queues
  • del3_headerAbusing Delegation with Impacket (Part 3): Resource-Based Constrained Delegation
    This is the third in a three-part series of blog posts
  • HACKED2025_headerWhy You Got Hacked – 2025 Super Edition
    This article was written to provide readers with an

Browse by topic

Active Directory ADHD AI anti-virus Attack Tactics AV Beau Bullock BHIS Blue Team C2 Carrie Roberts cloud Cyber Deception hacking Hashcat infosec Infosec for Beginners InfoSec Survival Guide Joff Thyer john strand Jordan Drysdale Kent Ickler Kerberos Linux MailSniper Microsoft Nessus Nmap passwords password spraying pen-testing penetration testing pentest Pentesting phishing PowerShell Python Red Team red teaming RITA Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security, Inc.

890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008


About Us | BHIS Tribe of Companies | Privacy Policy | Contact

Links
Search the site