Black Hills Information Security, Inc.
RSS
  • All Services
    • Complete Service Guide
    • Active SOC
    • AI Security Assessments
    • Blockchain Security
    • Blue Team Services
    • Continuous Penetration Testing
    • High-Profile Risk Assessments
    • Incident Response
    • Penetration Testing
  • Contact Us
    • Contact Us
    • Email Sign-Up
  • About Us
    • Security Consultants
    • Admin
    • SOC Team
    • Antisyphon Training
    • BHIS Family of Companies
  • Free Resources
    • Blogs
    • Free Cybersecurity Tools
    • Free Cybersecurity Webcasts
    • Podcasts
    • RITA
  • Training
    • BHIS & Antisyphon Training
    • WWHF Conference
  • Online Community
    • Discord
    • LinkedIn
    • YouTube
    • Bluesky
    • Twitter/X
    • Upcoming Events
  • Fun Stuff
    • Backdoors & Breaches
    • Merch, Zines & More
    • PROMPT# Zine
    • REKCAH
    • Books
00434_01282020_MyFirstJoyrideWithSILENTTRINITY

Author, How-To, Informational, Jordan Drysdale, Red Team Jordan Drysdale, SILENTTRINITY

My First Joyride With SILENTTRINITY

TL;DR SILENTTRINITY (ST) made the news a few times in July 2019, and I wanted to see what all the fuss was about. This article has enough information to get […]

Read the entire post here
00433_01242020_RedTeamersCookbook-2

How-To, Informational, Red Team BYOI, Marcello Salvati, Red Team

Red Teamer’s Cookbook: BYOI (Bring Your Own Interpreter)

Marcello Salvati // This fairly lengthy blog post aims at providing Red Team Operators ideas on how to incorporate BYOI tradecraft into their own custom tooling and get those creative […]

Read the entire post here
00432_01242020_DumpingFirmwareWithCH341a

Hardware Hacking, How-To, Informational AsProgrammer, Rick Wisser

Dumping Firmware With the CH341a Programmer

Rick Wisser // Note: This blog will also be a lab for any of the upcoming Wild West Hackin’ Fest Conferences. During a recent engagement, I came across an issue. […]

Read the entire post here
00431_01232020_WhatYouShouldLearnPentestReport

Informational, InfoSec 101 dakota nelson, pentest reports, Pentesting

What You Should Actually Learn From a Pentest Report

Dakota Nelson // Unknown Unknowns: So you’ve been pentested. Congrats! It might not feel like it, but this will eventually leave you more confident about your security, not less. The […]

Read the entire post here
00430_01222020_HowToReplayRFSignalsSDR-1

Author, Hardware Hacking, How-To, Informational, Ray Felch Raymond Felch, SDR, Software Defined Radio

How To Replay RF Signals Using SDR

Ray Felch // SOFTWARE DEFINED RADIO: RF Signal Replay Techniques Disclaimer: Be sure to use a faraday bag or cage before transmitting any data so you don’t accidentally break any […]

Read the entire post here
00429_01142020_WebcastSacredCashCow2020

Author, General InfoSec Tips & Tricks, How-To, Informational, InfoSec 101, John Strand, Webcasts carbonblack, Cisco, Cylance Bypass, john strand, PowerShell, Sacred Cash Cow Tipping, webcasts, Windows Defender

Webcast: Sacred Cash Cow Tipping 2020

Want to learn how attackers bypass endpoint products? Slides for this webcast can be found here: https://www.blackhillsinfosec.com/wp-content/uploads/2020/09/SLIDES_SacredCashCowTipping2020.pdf 3:41 – Alternate Interpreters 9:19 – Carbon Black Config Issue 15:07 – Cisco […]

Podcast: Play in new window | Download

Subscribe: Apple Podcasts | Spotify | Amazon Music | RSS

Read the entire post here
00426_01022020_PaperPasswordManager

Author, How-To, Informational, Michael Allen, Password Cracking Michael Allen, Paper Password Manager, password management, passwords

The Paper Password Manager

Michael Allen // Every year around the holidays I end up having a conversation with at least one friend or family member about the importance of choosing unique passwords for […]

Read the entire post here
00425_12182019_TwastheWeekBeforeHackmas

Fun & Games, Informational dakota nelson, hackmas

‘Twas the Week Before Hackmas

Dakota Nelson // ‘Twas the week before HackmasAnd all through their housesNot a tester was workingNor moving their mouses The findings were listed in reports with careIn hopes that bugfixes […]

Read the entire post here
00423_12112019_WebcastPasswordsWeakestLink

Informational, Password Cracking, Password Spray, Webcasts Darin Roberts, password policy, passwords

Webcast: Passwords: You Are the Weakest Link

Why are companies still recommending an 8-character password minimum?  Passwords are some of the easiest targets for attackers, yet companies still allow weak passwords in their environment. Multiple service providers recommend […]

Podcast: Play in new window | Download

Subscribe: Apple Podcasts | Spotify | Amazon Music | RSS

Read the entire post here
«‹ 34 35 36 37›»

Looking For Something?

Browse by category

Recent Posts

  • smart goals_header (1)How to Set Smart Goals (That Actually Work For You)
    Setting goals is a deceptively simple career skill we
  • socinterview_headerInside the BHIS SOC: A Conversation with Hayden CovingtonĀ 
    What happens when you ditch the tiered ticket queues
  • del3_headerAbusing Delegation with Impacket (Part 3): Resource-Based Constrained Delegation
    This is the third in a three-part series of blog posts

Browse by topic

Active Directory ADHD AI anti-virus Attack Tactics AV Beau Bullock BHIS Blue Team C2 Carrie Roberts cloud Cyber Deception hacking Hashcat infosec Infosec for Beginners InfoSec Survival Guide Joff Thyer john strand Jordan Drysdale Kent Ickler Kerberos Linux MailSniper Microsoft Nessus Nmap passwords password spraying pen-testing penetration testing pentest Pentesting phishing PowerShell Python Red Team red teaming RITA Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security, Inc.

890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008


About Us | BHIS Tribe of Companies | Privacy Policy | Contact

Links
Search the site