Mike Felch
![BLOG_chalkboard_00591 BLOG_chalkboard_00591](https://www.blackhillsinfosec.com/wp-content/uploads/2022/02/BLOG_chalkboard_00591-1024x576-221x221.jpg)
Rogue RDP – Revisiting Initial Access Methods
Mike Felch // The Hunt for Initial Access With the default disablement of VBA macros originating from the internet, Microsoft may be pitching a curveball to threat actors and red […]
![00387_05112019_PODCAST_Weaponizing_Intel 00387_05112019_PODCAST_Weaponizing_Intel](https://www.blackhillsinfosec.com/wp-content/uploads/2019/05/00387_05112019_PODCAST_Weaponizing_Intel-1024x576-221x221.png)
Podcast: Weaponizing Corporate Intel. This Time, It’s Personal!
Beau Bullock & Mike Felch// Strategically targeting a corporation requires deep knowledge of their technologies and employees. Successfully compromising an organization can depend on the quality of reconnaissance a tester […]
Podcast: Play in new window | Download
Subscribe: Apple Podcasts | Spotify | Amazon Music | RSS
![BHIS_YT_WEBCAST1 BHIS_YT_WEBCAST1](https://www.blackhillsinfosec.com/wp-content/uploads/2019/05/BHIS_YT_WEBCAST1-1024x576-221x221.png)
Webcast: Weaponizing Corporate Intel. This Time, It’s Personal!
Beau Bullock & Mike Felch// Strategically targeting a corporation requires deep knowledge of their technologies and employees. Successfully compromising an organization can depend on the quality of reconnaissance a tester […]
![00381_Google_Purge_p2_03272019 00381_Google_Purge_p2_03272019](https://www.blackhillsinfosec.com/wp-content/uploads/2019/03/00381_Google_Purge_p2_03272019-1024x576-221x221.png)
How to Purge Google and Start Over – Part 2
Mike Felch// How to Purge Google and Start Over – Part 1 Brief Recap In part 1, we discussed a red team engagement that went south when the Google SOC […]
![00380_Google_Purge_p1_03272019 00380_Google_Purge_p1_03272019](https://www.blackhillsinfosec.com/wp-content/uploads/2019/03/00380_Google_Purge_p1_03272019-1024x576-221x221.png)
How to Purge Google and Start Over – Part 1
Mike Felch// A Tale of Blue Destroying Red Let me start by sharing a story about a fairly recent red team engagement against a highly-secured technical customer that didn’t end […]
![beau and mike RDP beau and mike RDP](https://www.blackhillsinfosec.com/wp-content/uploads/2018/12/beau-and-mike-RDP-1024x1024-221x221.jpg)
PODCAST: RDP Logging Bypass and Azure Active Directory Recon
For this podcast we cover a couple of different topics. First, we talk about how to password spray in a non-attributable sort of way. Beau found a way to obfuscate […]
Podcast: Play in new window | Download
Subscribe: Apple Podcasts | Spotify | Amazon Music | RSS
![YouTube Dec 18 YouTube Dec 18](https://www.blackhillsinfosec.com/wp-content/uploads/2018/12/YouTube-Dec-18-1024x576-221x221.jpg)
WEBCAST: RDP Logging Bypass and Azure Active Directory Recon
For this webcast we cover a couple of different topics. First, we talk about how to password spray in a non-attributable sort of way. Beau found a way to obfuscate […]
![00334_08312018_ActiveDirectoryLeaksViaAzure 00334_08312018_ActiveDirectoryLeaksViaAzure](https://www.blackhillsinfosec.com/wp-content/uploads/2019/10/00334_08312018_ActiveDirectoryLeaksViaAzure-1024x576-221x221.png)
Red Teaming Microsoft: Part 1 – Active Directory Leaks via Azure
Mike Felch // With so many Microsoft technologies, services, integrations, applications, and configurations it can create a great deal of difficulty just to manage everything. Now imagine trying to secure […]