Normal view
Webcast: Weaponizing Active Directory
![]()
Click on the timecodes to jump to that part of the video (on YouTube) Slides for this webcast can be found here: https://www.blackhillsinfosec.com/wp-content/uploads/2020/09/SLIDES_WeaponizingActiveDirectory.pdf 0:54 Background behind this webcast, what and [β¦]
The post Webcast: Weaponizing Active Directory appeared first on Black Hills Information Security, Inc..
WEBCAST: CredDefense Toolkit
![]()
Beau Bullock, Brian Fehrman, & Derek Banks // Pentesting organizations as your day-to-day job quickly reveals commonalities among environments. Although each test is a bit unique, thereβs a typical path [β¦]
The post WEBCAST: CredDefense Toolkit appeared first on Black Hills Information Security, Inc..
The CredDefense Toolkit
![]()
Derek Banks, Beau Bullock, & Brian Fehrman // Our clients often ask how they could have detected and prevented the post-exploitation activities we used in their environment to gain elevated [β¦]
The post The CredDefense Toolkit appeared first on Black Hills Information Security, Inc..
Time To Bash on Windows (Bourne Again Shell That Is)
Editorβs Note: This is another awesomeΒ guest post from our friend, Robert Schwass. If youβd like to guest post contact us here. Robert Schwass // I had heard the rumors about [β¦]
The post Time To Bash on Windows (Bourne Again Shell That Is) appeared first on Black Hills Information Security, Inc..