Black Hills Information Security, Inc.
RSS
  • All Services
    • Complete Service Guide
    • Active SOC
    • AI Security Assessments
    • Blockchain Security
    • Blue Team Services
    • Continuous Penetration Testing
    • High-Profile Risk Assessments
    • Incident Response
    • Penetration Testing
  • Contact Us
    • Contact Us
    • Email Sign-Up
  • About Us
    • Security Consultants
    • Admin
    • SOC Team
    • BHIS Family of Companies
  • Free Resources
    • Blogs
    • Free Cybersecurity Tools
    • Free Cybersecurity Webcasts
    • Podcasts
    • RITA
  • Training
    • BHIS & Antisyphon Training
    • WWHF Conference
  • Online Community
    • Discord
    • LinkedIn
    • YouTube
    • Bluesky
    • Twitter/X
    • Upcoming Events
  • Fun Stuff
    • Backdoors & Breaches
    • Merch, Zines & More
    • PROMPT# Zine
    • REKCAH
    • Books
Modifying Metasploit x64 template for AV evasion

Author, External/Internal, Joff Thyer, Red Team AV, AV evasion, modifying measpoilt, shellcode

Modifying Metasploit x64 template for AV evasion

Joff Thyer //   When performing a penetration of test of organizations with Windows desktops, many testers will now resort to using tools like Veil’s Powershell Empire in order to […]

Read the entire post here
Service Detection – Tomcat Manager, From “Info” to “Ouch”

Red Team, Web App Info2Ouch, Nessus, Vulnerabilities

Service Detection – Tomcat Manager, From “Info” to “Ouch”

Carrie Roberts // Continuing on the thread of highlighting Nessus vulnerability scan results that turned out to be more severe than reported . . . I always review the “Info” level “Service Detection” […]

Read the entire post here
Asterisk SIP Server, From “Info” to “Ouch”

External/Internal, Password Spray, Red Team Info2Ouch, Nessus, Vulnerabilities

Asterisk SIP Server, From “Info” to “Ouch”

Carrie Roberts // I learned some new stuff that will make me pay attention to “Asterisk Detection” Nessus informational findings in the future . . . On an external network […]

Read the entire post here

InfoSec 301 Blue Team, Danger Will Robinson, MS15-034, Patch, Purple Team, Red Team, Remote Code Execution

Waiting Is the Hardest Part: A Purple Team’s Take on MS15-034

Mick Douglas // Current Status: – MS15-034 has remote Denial of Service (DoS) – Remote exploit code appears to be ready soon… maybe.  Stay tuned. BLUE TEAM MARCHING ORDERS: – […]

Read the entire post here
A Need For A Change – or – Burning Your Money

InfoSec 201, News breach, external breach, internal breach, it security, verizon breach report

A Need For A Change – or – Burning Your Money

Mick Douglas // Take look at this chart from last year’s Verizon Data Breach Report.  It shows who notified the breached party when they were attacked. This graph is a […]

Read the entire post here
«‹ 76 77 78 79

Looking For Something?

Browse by category

Recent Posts

  • del_header (1)Abusing Delegation with Impacket (Part 1): Unconstrained Delegation
    In Active Directory exploitation, Kerberos delegation
  • GOSPOOF_headerGoSpoof – Turning Attacks into Intel 
    Imagine this: You’re an attacker ready to get their
  • mcp_headerModel Context Protocol (MCP)
    The Model Context Protocol (MCP) is a proposed open

Browse by topic

Active Directory ADHD AI anti-virus Attack Tactics AV Beau Bullock BHIS Blue Team C2 Carrie Roberts Cheatsheet cloud Cyber Deception hacking Hashcat infosec Infosec for Beginners InfoSec Survival Guide Joff Thyer john strand Jordan Drysdale Kent Ickler Linux MailSniper Microsoft Nessus Nmap passwords password spraying pen-testing penetration testing pentest Pentesting phishing PowerShell Python Red Team red teaming RITA Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security, Inc.

890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008


About Us | BHIS Tribe of Companies | Privacy Policy | Contact

Links
Search the site