Black Hills Information Security, Inc.
RSS
  • All Services
    • Complete Service Guide
    • Active SOC
    • AI Security Assessments
    • Blockchain Security
    • Blue Team Services
    • Continuous Penetration Testing
    • High-Profile Risk Assessments
    • Incident Response
    • Penetration Testing
  • Contact Us
    • Contact Us
    • Email Sign-Up
  • About Us
    • Security Consultants
    • Admin
    • SOC Team
    • Antisyphon Training
    • BHIS Tribe of Companies
  • Free Resources
    • Blogs
    • Free Cybersecurity Tools
    • Free Cybersecurity Webcasts
    • Podcasts
    • RITA
  • Training
    • BHIS & Antisyphon Training
    • WWHF Conference
  • Community
    • Discord
    • LinkedIn
    • YouTube
    • Bluesky
    • Twitter/X
    • Upcoming Events
  • Fun Stuff
    • Backdoors & Breaches
    • Merch, Zines & More
    • PROMPT# Zine
    • REKCAH
    • Books
00457_04152020_HomeNetworkDesignPart2

Author, Ethan Robish, How-To, Informational, InfoSec 101 ethan robish, home network

Home Network Design – Part 2

Ethan Robish // Why Segment Your Network? Here’s a quick recap from Part 1. A typical home network is flat. This means that all devices are connected to the same […]

Read the entire post here
00446_03202020_WordWebBugs

Author, Fun & Games, How-To, Informational, InfoSec 101, John Strand Cyber Deception, Word Web Bugs

Tracking Attackers With Word Web Bugs (Cyber Deception)

Hello and welcome! My name is John Strand, and in this video, we’re going to be talking about Word Web Bug Servers. Now the idea of a Word Web Bug […]

Read the entire post here
00445_03202020_HowToUsePortspoof

Author, Fun & Games, How-To, Informational, InfoSec 101, John Strand

How To Use Portspoof (Cyber Deception)

Hello and welcome, and in this video, we’re going to be talking a little bit about Portspoof, a fantastic utility that takes your unused TCP/IP ports and turns them into […]

Read the entire post here
00456_04032020_LogonScripts

Author, David Fletcher, Fun & Games, Informational, InfoSec 101, Red Team Backdoors & Breaches, David Fletcher

Backdoors & Breaches: Logon Scripts

David Fletcher // This blog post discusses the relevance and techniques involved in logon script abuse. While the Backdoors & Breaches card is featured for this topic, the post will […]

Read the entire post here
00455_03302020_WebcastPandemicParadigmShift

Author, General InfoSec Tips & Tricks, How-To, Informational, InfoSec 101, Joff Thyer, Webcasts Joff Thyer, john strand, VPN

Webcast: Pandemic Paradigm Shift: Remote Working is the New Normal

What does it mean to work from home across your corporate VPN? What exactly is VPN? Is your home office prepared? How can you improve and better secure your home […]

Podcast: Play in new window | Download

Subscribe: Apple Podcasts | Spotify | Amazon Music | RSS

Read the entire post here
00444_03202020_SpiderTrap (1)

Author, Fun & Games, How-To, Informational, John Strand Cyber Deception, spidertrap

Messing With Web Attackers With SpiderTrap (Cyber Deception)

Hello and welcome! My name is John Strand. In this video, we’re going to be talking about using SpiderTrap to entrap and ensnare any web application pentesters or hackers that […]

Read the entire post here
00453_03182020_WebcastHowWeRunVirtualCon

Author, Deb Wigley, Fun & Games, How-To, Informational, Jason Blanchard, John Strand, Webcasts WWHF

Webcast: How (we) Run a Virtual Conference and How You Can, Too

The team at Black Hills Information Security and Wild West Hackin’ Fest had to pivot from doing an in-person information security conference in San Diego to a 100% virtual conference […]

Podcast: Play in new window | Download

Subscribe: Apple Podcasts | Spotify | Amazon Music | RSS

Read the entire post here
00454_03202020_CheckYourPerimeter

Author, David Fletcher, General InfoSec Tips & Tricks, How-To, Informational, InfoSec 101 David Fletcher

Check Your Perimeter

David Fletcher // With so many organizations transitioning to remote work in order to stem the tide of COVID-19 infections, we wanted to cover some of the configuration elements you […]

Read the entire post here
YTBH110_03192020_MessingWithPortscans

Author, How-To, InfoSec 101, John Strand, Red Team, Red Team Tools Cyber Deception, honeyports, john strand

Messing With Portscans With Honeyports (Cyber Deception)

Hello and welcome! My name is John Strand, and in this video, we’re going to be talking about tripwire Honeyports. Now, this is a lab that’s used in ADHD. This […]

Read the entire post here
«‹ 32 33 34 35›»

Looking For Something?

Browse by category

Recent Posts

  • The Curious Case of the ComburglarThe Curious Case of the Comburglar
    By Troy Wojewoda During a recent Breach Assessment
  • smart goals_header (1)How to Set Smart Goals (That Actually Work For You)
    Setting goals is a deceptively simple career skill we
  • socinterview_headerInside the BHIS SOC: A Conversation with Hayden Covington 
    What happens when you ditch the tiered ticket queues

Browse by topic

Active Directory ADHD AI anti-virus Attack Tactics AV Beau Bullock BHIS Blue Team C2 Carrie Roberts cloud Cyber Deception hacking Hashcat infosec Infosec for Beginners InfoSec Survival Guide Joff Thyer john strand Jordan Drysdale Kent Ickler Kerberos Linux MailSniper Microsoft Nessus Nmap passwords password spraying pen-testing penetration testing pentest Pentesting phishing PowerShell Python Red Team red teaming RITA Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security, Inc.

890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008


About Us | BHIS Tribe of Companies | Privacy Policy | Contact

Links
Search the site