Search Results for: password
Caging Copilot: Lessons Learned in LLM Security
For those of us in cybersecurity, there are a lot of unanswered questions and associated concerns about integrating AI into these various products. No small part of our worries has to do with the fact that this is new technology, and new tech always brings with it new security issues, especially technology that is evolving as quickly as AI.
How to Test Adversary-in-the-Middle Without Hacking Tools
In this video, Michael Allen discusses how to test Adversary-in-the-Middle attacks without using hacking tools. He delves into the intricacies of credential harvesting, the evolution of multi-factor authentication (MFA), and how attackers adapt their strategies to bypass security measures.
Canary in the Code: Alert()-ing on XSS Exploits
Iāve been a web application pentester for a while now and over the years must have found hundreds of cross-site scripting (XSS) vulnerabilities.1 Cross-site scripting is a notoriously difficult problem […]
How to Hack Wi-Fi with No Wi-Fi
In this video, John Strand and his team discuss the challenges of setting up and running wireless labs, particularly focusing on the issues faced during Wild West Hackinā Fest events. They highlight the development of an open-source project aimed at virtualizing wireless labs, which allows learners to practice wireless hacking techniques without needing physical hardware.
Light at the End of the Dark Web
Join us for this one-hour Black Hills Information Security webcast with Joseph – Security Analyst, as he shares with you what he’s discovered and learned about the Dark Web, so you never ever ever have to go there for yourself.
Avoiding Dirty RAGs: Retrieval-Augmented Generation with Ollama and LangChain
RAG connects pre-trained LLMs with current data sources. Moreover, a RAG system can use many data sources.
Gone Phishing: Installing GoPhish and Creating a Campaign
GoPhish provides a nice platform for creating and running phishing campaigns. This blog will guide you through installing GoPhish and creating a campaign.Ā
5 Things We Are Going to Continue to Ignore in 2025
In this video, John Strand discusses the complexities and challenges of penetration testing, emphasizing that it goes beyond just finding and exploiting vulnerabilities.
