Black Hills Information Security, Inc.
RSS
  • All Services
    • Complete Service Guide
    • Active SOC
    • AI Security Assessments
    • Blockchain Security
    • Blue Team Services
    • Continuous Penetration Testing
    • High-Profile Risk Assessments
    • Incident Response
    • Penetration Testing
  • Contact Us
    • Contact Us
    • Email Sign-Up
  • About Us
    • Security Consultants
    • Admin
    • SOC Team
    • Antisyphon Training
    • BHIS Tribe of Companies
  • Free Resources
    • Blogs
    • Free Cybersecurity Tools
    • Free Cybersecurity Webcasts
    • Podcasts
    • RITA
  • Training
    • BHIS & Antisyphon Training
    • WWHF Conference
  • Community
    • Discord
    • LinkedIn
    • YouTube
    • Bluesky
    • Twitter/X
    • Upcoming Events
  • Fun Stuff
    • Backdoors & Breaches
    • Merch, Zines & More
    • PROMPT# Zine
    • REKCAH
    • Books
75fce7_64d0f839ad00414d94c8de7e559117e8

Author, Beau Bullock, External/Internal, Password Spray, Red Team domain creds, exploiting passwords, gaining access to domain credentials, passwords, reusing passwords

Exploiting Password Reuse on Personal Accounts: How to Gain Access to Domain Credentials Without Being on a Target’s Network: Part 1

Beau Bullock // In this series of posts I am going to detail multiple ways to gain access to domain user credentials without ever being on a target organization’s network. […]

Read the entire post here
Warning: This Post Contains Macros

How-To, InfoSec 101 Average User, BlackEnergy, Education, macros, MS Office, Ukraine

Warning: This Post Contains Macros

Lisa Woody // On the 23rd of December, a cyber attack left hundreds of thousands of people in the Ukrainian region of Ivano-Frankivsk without power. This was the first confirmed […]

Read the entire post here
Let’s Talk About Direct Object References

Red Team, Web App Direct Object References, HIPAA, HIPAA violations, user profiles, XKCD

Let’s Talk About Direct Object References

Kelsey Bellew // Maybe you don’t know what Direct Object References mean, if you Google it, you’d get this: This description uses the words “direct”, “object” and “reference” to describe a […]

Read the entire post here
Beware Public Wi-Fi Insecurity – Part 1: Reviewing the Neighborhood

Author, General InfoSec Tips & Tricks, InfoSec 101, Jordan Drysdale free wifi, the dangers of public wifi, wifi

Beware Public Wi-Fi Insecurity – Part 1: Reviewing the Neighborhood

Jordan Drysdale // Our community’s downtown district is approximately a five block by four block area. There are art stores, toy shops, candy retailers, restaurants, bars and hotels. Significant investment […]

Read the entire post here
Hacking Like It’s 1999

Blue Team, How-To, Hunt Teaming hacking, old scripts, old stuff

Hacking Like It’s 1999

Lawrence Hoffman // Last week a friend stopped by my desk with a worried look on his face. He knelt down and showed me the screen of his laptop where […]

Read the entire post here
Why The Hate for Threat Intelligence Feeds?

Author, InfoSec 101, John Strand

Why The Hate for Threat Intelligence Feeds?

John Strand // Recently on an episode of Security Weekly, I lost my mind on threat intelligence feeds.  I feel just a bit bad about it. Right Apollo? But…  I […]

Read the entire post here

Author, Brian Fehrman, External/Internal, Phishing, Red Team email filters, empire macros, modifying empire macros

How To Modify Empire Macro to Bypass Mail Filters

Brian Fehrman //

Read the entire post here
Pentesting with Linked Clones

Author, Brian King, How-To, InfoSec 101 linked clones, Pentesting, virtual machine, VM

Pentesting with Linked Clones

Brian B. King // If working with several customers at once, or in succession, it would be easy to lose track of whose data you’re looking at, or to include […]

Read the entire post here
75fce7_17bef76f115246d593e62f14d349b4ae

External/Internal, Red Team encryption, mimikatz, passwords

Your Password Is… wait for it… NOT Always Encrypted

Sally Vandeven // As pentesters we LOVE passwords – they come in all shapes and sizes. A good password has 16+ characters and a mix of case, digits and special […]

Read the entire post here
«‹ 77 78 79 80›

Looking For Something?

Browse by category

Recent Posts

  • homelab_headerWhat to Do with Your First Home Lab
    Having assembled fundamental lab components, you now
  • deadwood_headerWhen the SOC Goes to Deadwood: A Night to Remember 
    Hear a tale about the time the BHIS SOC team conducted
  • Social Engineering and Microsoft SSPRSocial Engineering and Microsoft SSPR: The Road to Pwnage is Paved with Good Intentions 
    This scenario simultaneously tests identity

Browse by topic

Active Directory ADHD AI anti-virus Attack Tactics AV Beau Bullock BHIS Blue Team C2 Carrie Roberts cloud Cyber Deception hacking Hashcat infosec Infosec for Beginners InfoSec Survival Guide Joff Thyer john strand Jordan Drysdale Kent Ickler Kerberos Linux MailSniper Microsoft Nessus Nmap passwords password spraying pen-testing penetration testing pentest Pentesting phishing PowerShell Python Red Team red teaming RITA Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security, Inc.

890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008


About Us | BHIS Tribe of Companies | Privacy Policy | Contact

Links
Search the site