❌

Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

Performing a Physical Pentest? Bring This!

By: BHIS
13 December 2017 at 11:12

Jordan Drysdale// Physical Pentest Upcoming? Bring a Badgy. While badge reproduction may not be the intended use of this product, if you are a physical tester and you don’t own […]

The post Performing a Physical Pentest? Bring This! appeared first on Black Hills Information Security, Inc..

Go Ahead, Make Our Day

By: BHIS
15 February 2017 at 10:54

Sally VandevenΒ & the BHIS TeamΒ // I was recently on an assessment where IΒ was able to grab all the password hashes from the domain controller. When I extracted the hashes and […]

The post Go Ahead, Make Our Day appeared first on Black Hills Information Security, Inc..

The Wi-Fi Travel Kits

By: BHIS
9 February 2017 at 11:50

Jordan Drysdale // Sally and I recently ventured to an on-site wireless engagement with a veryΒ security-matureΒ customer. Long story short, the level of protection that WPA2 Enterprise with certificate validation provides […]

The post The Wi-Fi Travel Kits appeared first on Black Hills Information Security, Inc..

How to Take Advantage of Weak NTFS Permissions

By: BHIS
13 October 2016 at 12:35

David Fletcher // Weak NTFS permissions can allow a number of different attacks within a target environment. This can include: Access to sensitive information Modification of system binaries and configuration […]

The post How to Take Advantage of Weak NTFS Permissions appeared first on Black Hills Information Security, Inc..

Downloading an Address Book from an Outlook Web App (OWA) Portal

By: BHIS
14 September 2016 at 11:46

Carrie Roberts //Β  Update 10/03/16:Β Want to download the address book automatically with PowerShell? Check out Beau Bullocks latest additions to MailSniper As part of a penetration test, you’ve gained access […]

The post Downloading an Address Book from an Outlook Web App (OWA) Portal appeared first on Black Hills Information Security, Inc..

How to Build Your Own Penetration Testing Drop Box

By: BHIS
3 August 2016 at 08:55

Beau Bullock // TL;DR I compared three single-board computers (SBC) against each other with a specific goal of finding which one would serve best as a β€œpenetration testing dropbox”, and […]

The post How to Build Your Own Penetration Testing Drop Box appeared first on Black Hills Information Security, Inc..

❌
❌