❌

Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

Hunting for SSRF Bugs in PDF GeneratorsΒ 

If you’ve been on a website and noticed one of the following features, there’s a good chance you’ve stumbled upon a hot spot for server-side request forgery (SSRF) bugs:Β  Before […]

The post Hunting for SSRF Bugs in PDF GeneratorsΒ  appeared first on Black Hills Information Security, Inc..

Spamming Microsoft 365 Like It’s 1995Β 

14 December 2023 at 11:00

I previously blogged about spoofing Microsoft 365 using the direct send feature enabled by default when creating a business 365 Exchange Online instance (https://www.blackhillsinfosec.com/spoofing-microsoft-365-like-its-1995/). Using the direct send feature, it […]

The post Spamming Microsoft 365 Like It’s 1995Β  appeared first on Black Hills Information Security, Inc..

OSINT for Incident Response (Part 1)

Being a digital forensics and incident response consultant is largely about unanswered questions. When we engage with a client, they know something bad happened or is happening, but they are […]

The post OSINT for Incident Response (Part 1) appeared first on Black Hills Information Security, Inc..

Unpacking the Packet: Demystifying the Internet Protocol

16 November 2023 at 11:57

The internet is a product of a global group effort to build an interoperable network connecting billions of devices, regardless of country, region, or manufacturer. That effort yielded hundreds of […]

The post Unpacking the Packet: Demystifying the Internet Protocol appeared first on Black Hills Information Security, Inc..

Opt for TOTP to Deal With MFA App Sprawl

| Sean Verity Do you have a bunch of MFA apps on your phone that leave you feeling like you can’t put your arms down? Or maybe all those MFA […]

The post Opt for TOTP to Deal With MFA App Sprawl appeared first on Black Hills Information Security, Inc..

Introducing GraphRunner: A Post-Exploitation Toolset for Microsoft 365

By Beau Bullock & Steve Borosh TL;DR We built a post-compromise toolset called GraphRunner for interacting with the Microsoft Graph API. It provides various tools for performing reconnaissance, persistence, and […]

The post Introducing GraphRunner: A Post-Exploitation Toolset for Microsoft 365 appeared first on Black Hills Information Security, Inc..

Join Us for Camp BHIS @ DEF CON 31Β 

Hey, Campers! It’s that time of year again. The smell of 0-day in the air. Charlatans roasting by the pyre. Old friends and new gather in one of the worst […]

The post Join Us for Camp BHIS @ DEF CON 31Β  appeared first on Black Hills Information Security, Inc..

Genymotion – Proxying Android App Traffic Through Burp Suite | Cameron Cartier

Mobile App Testing is a category showing no signs of slowing down. In this video, BHIS tester Cameron Cartier walks us through linking Genymotion to Burp Suite for traffic monitoring. […]

The post Genymotion – Proxying Android App Traffic Through Burp Suite | Cameron Cartier appeared first on Black Hills Information Security, Inc..

Got Enough Monitors?

Carrie Roberts // Guest Blog OK, I admit it: I might have a problem. But seriously, can you ever really have enough screen space? In this blog post, I’ll describe […]

The post Got Enough Monitors? appeared first on Black Hills Information Security, Inc..

❌
❌