Black Hills Information Security, Inc.
RSS
  • All Services
    • Complete Service Guide
    • Active SOC
    • AI Security Assessments
    • Blockchain Security
    • Blue Team Services
    • Continuous Penetration Testing
    • High-Profile Risk Assessments
    • Incident Response
    • Penetration Testing
  • Contact Us
    • Contact Us
    • Email Sign-Up
  • About Us
    • Security Consultants
    • Admin
    • SOC Team
    • Antisyphon Training
    • BHIS Tribe of Companies
  • Free Resources
    • Blogs
    • Free Cybersecurity Tools
    • Free Cybersecurity Webcasts
    • Podcasts
    • RITA
  • Training
    • BHIS & Antisyphon Training
    • WWHF Conference
  • Community
    • Discord
    • LinkedIn
    • YouTube
    • Bluesky
    • Twitter/X
    • Upcoming Events
  • Fun Stuff
    • Backdoors & Breaches
    • Merch, Zines & More
    • PROMPT# Zine
    • REKCAH
    • Books
Turning a Raspberry Pi 3 Into a Cloaking Device With goSecure VPN

Author, How-To, Jordan Drysdale cloaking, goSecure, great success, IADGov, magical time, non-attrib, raspberry Pi, VPN

Turning a Raspberry Pi 3 Into a Cloaking Device With goSecure VPN

Jordan Drysdale // This article, like the IADGov link here has three major steps. First, acquire a Raspberry Pi and a VPS running CentOS 6.8. Second, configure the server and Raspberry […]

Read the entire post here
Philosoraptor - If my reverse shell never reaches the listener was the payload ever even executed?

External/Internal, Red Team Brute Forcing, Listeners, PowerShell, SET

Adding Egress Brute Force to PowerShell Payloads

Guest post* by Robert Schwass // We’ve all been there. You craft the perfect phishing email, register a great domain name, your multi handler is set up ever so perfectly. And […]

Read the entire post here
twitter girl.png

InfoSec 201 fun with social networks, kony2012, social engineering, social media mining

Mining Mary’s Social Media Antics for Social Engineering

Christine Sorensen // Let’s talk about Mary. Mary Watson is a girl in her twenties and just graduated from Midtown University with her bachelors in Fashion Merchandising. Mary is now […]

Read the entire post here
stickynotecomputer

External/Internal, Red Team Burp, Duct Tape, Mechanical Engineering, password spraying, pen-testing

Downloading an Address Book from an Outlook Web App (OWA) Portal

Carrie Roberts //  Update 10/03/16: Want to download the address book automatically with PowerShell? Check out Beau Bullocks latest additions to MailSniper As part of a penetration test, you’ve gained access […]

Read the entire post here
Let’s Get Physical* Part 1; Defeating Wetware Access Controls

Physical, Red Team breech, defeating access controls, getting in, insiders, olivia newton john, physical pen test, physical pen testing

Let’s Get Physical* Part 1; Defeating Wetware Access Controls

Sally Vandeven // I found myself with a little extra time one day (and I didn’t tell my project manager) so I thought it would be a great time to […]

Read the entire post here

Author, Blue Team, Blue Team Tools, John Strand ADHD, honeyports

Honeyports & ADHD!!!

John Strand // Lets take a look at how to use HoneyPorts on the new Active Defense Harbinger Distribution. For those of you who do not know, this is a […]

Read the entire post here
How Does Let’s Encrypt Gain Your Browser’s Trust?

Author, Ethan Robish, How-To encryption, Let's Encrypt, SSL/TLS certificate

How Does Let’s Encrypt Gain Your Browser’s Trust?

Ethan Robish // Let’s Encrypt is a free service that allows you to obtain a free (as in beer) SSL/TLS domain validation certificate to use as you wish.  Here is what […]

Read the entire post here
Lawrence Hoffman

News Darkweb Scanning, Dropbox, Election 2016, Election Fraud, Linux, network packet filtering support cgroups, OnionScan, Voter Fraud

Lawrence’s List 090216

Lawrence Hoffmann // Election fraud is something I’ve mentioned here recently. The reality we must face here is that any time a digital system is used for voting there is […]

Read the entire post here
00107_08312016_PowershellWithoutPowershell

Author, Beau Bullock, Brian Fehrman, Red Team, Red Team Tools how to bypass Anti Virus, How to bypass AV, How to bypass whitelisting, PowerShell, PowerShell without PowerShell, What to do when PowerShell is banned

Powershell Without Powershell – How To Bypass Application Whitelisting, Environment Restrictions & AV

Brian Fehrman (With shout outs to: Kelsey Bellew, Beau Bullock) // In a previous blog post, we talked about bypassing AV and Application Whitelisting by using a method developed by Casey Smith. In […]

Read the entire post here
«‹ 67 68 69 70›»

Looking For Something?

Browse by category

Recent Posts

  • The Curious Case of the ComburglarThe Curious Case of the Comburglar
    By Troy Wojewoda During a recent Breach Assessment
  • smart goals_header (1)How to Set Smart Goals (That Actually Work For You)
    Setting goals is a deceptively simple career skill we
  • socinterview_headerInside the BHIS SOC: A Conversation with Hayden Covington 
    What happens when you ditch the tiered ticket queues

Browse by topic

Active Directory ADHD AI anti-virus Attack Tactics AV Beau Bullock BHIS Blue Team C2 Carrie Roberts cloud Cyber Deception hacking Hashcat infosec Infosec for Beginners InfoSec Survival Guide Joff Thyer john strand Jordan Drysdale Kent Ickler Kerberos Linux MailSniper Microsoft Nessus Nmap passwords password spraying pen-testing penetration testing pentest Pentesting phishing PowerShell Python Red Team red teaming RITA Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security, Inc.

890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008


About Us | BHIS Tribe of Companies | Privacy Policy | Contact

Links
Search the site