❌

Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

Why Your Org Needs a Penetration Test Program

By: BHIS
10 March 2025 at 11:30

This webcast originally aired on February 27, 2025. Join us for a very special free one-hour Black Hills Information Security webcast with Corey Ham & Kelli Tarala on why your […]

The post Why Your Org Needs a Penetration Test Program appeared first on Black Hills Information Security, Inc..

Cisco Smart Install Escalation and Update!

By: BHIS
21 December 2018 at 14:34

Jordan Drysdale// tl;dr Both Cisco and Nessus have escalated the Smart Install Client Service feature/vulnerability. Nessus is now reporting the Smart Install RCE as critical. High five!!! Cisco has also […]

The post Cisco Smart Install Escalation and Update! appeared first on Black Hills Information Security, Inc..

Pentesting Dropbox on Steroids

By: BHIS
20 November 2018 at 10:34

Joff Thyer// Many of you have probably already looked at Beau Bullock’s fine blog entry on a penetration testing dropbox. Beau has some excellent guidance on how to build the […]

The post Pentesting Dropbox on Steroids appeared first on Black Hills Information Security, Inc..

Embedding Meterpreter in Android APK

By: BHIS
15 October 2018 at 11:52

Joff Thyer// Mobile is everywhere these days. So many applications in our daily life are being migrated towards a cloud deployment whereby the front end technology is back to the […]

The post Embedding Meterpreter in Android APK appeared first on Black Hills Information Security, Inc..

PODCAST: What Is a Red Team, Anyway?

Dakota Nelson // Dakota talks about the pentester pyramid of pain and the different types of tests available from an information security firm. See his slides here:Β https://blackhillsinformationsecurity.shootproof.com/gallery/7404264/ Extra links & […]

The post PODCAST: What Is a Red Team, Anyway? appeared first on Black Hills Information Security, Inc..

πŸ’Ύ

What to Expect from a Vulnerability Scan

By: BHIS
12 April 2018 at 11:53

Dakota Nelson// For a lot of our customers, their first introduction to pentesting is a vulnerability scan from BHIS. This is after talking to the testers, of course, and setting […]

The post What to Expect from a Vulnerability Scan appeared first on Black Hills Information Security, Inc..

New Toy Alert: A Quick Review of Keysy

By: BHIS
5 April 2018 at 11:47

Rick Wisser// Here at BHIS we are always on the lookout for new toys. Especially if we can use them during a pentest. As a pentester, we all have a […]

The post New Toy Alert: A Quick Review of Keysy appeared first on Black Hills Information Security, Inc..

Performing a Physical Pentest? Bring This!

By: BHIS
13 December 2017 at 11:12

Jordan Drysdale// Physical Pentest Upcoming? Bring a Badgy. While badge reproduction may not be the intended use of this product, if you are a physical tester and you don’t own […]

The post Performing a Physical Pentest? Bring This! appeared first on Black Hills Information Security, Inc..

Cross-Post: MIR-SWAMP PEN TESTING WITH BLACK HILLS

By: BHIS
21 March 2017 at 11:16

This is a cross-posted blog post written by A. Miller, from SWAMP – the Software Assurance Marketplace. Β BHIS recently did an engagement with them and you can read about the entire […]

The post Cross-Post: MIR-SWAMP PEN TESTING WITH BLACK HILLS appeared first on Black Hills Information Security, Inc..

Phishing with PowerPoint

By: BHIS
16 May 2016 at 10:55

Carrie Roberts &Β Chevy Swanson // How do we make sure people open up our malicious files and execute them? We simply let Microsoft work for years and years to gain […]

The post Phishing with PowerPoint appeared first on Black Hills Information Security, Inc..

❌
❌