❌

Reading view

There are new articles available, click to refresh the page.

Webcast: Attack Tactics 5 – Zero to Hero Attack

Timecode links take you to YouTube: 4:11 – Infrastructure & Background8:28 – Overview & Breakdown of Attack Methodology and Plans11:35 – Start of Attack (Gaining Access), Password Spraying Toolkit15:24 – […]

The post Webcast: Attack Tactics 5 – Zero to Hero Attack appeared first on Black Hills Information Security, Inc..

Webcast: Sacred Cash Cow Tipping 2019

John Strand // Yet again it is time for another edition of Sacred Cash Cow Tipping! Or, β€œWhy do these endpoint security bypass techniques still work? Why?” The goal of […]

The post Webcast: Sacred Cash Cow Tipping 2019 appeared first on Black Hills Information Security, Inc..

PODCAST: Attack Tactics Part 3: No Active Directory? No Problem!

John StrandΒ talks about how BHIS pen tests companies who use the cloud. Want to know how you can defend against attacks in your cloud infrastructure? Keep your eyes peeled for […]

The post PODCAST: Attack Tactics Part 3: No Active Directory? No Problem! appeared first on Black Hills Information Security, Inc..

πŸ’Ύ

Performing a Physical Pentest? Bring This!

Jordan Drysdale// Physical Pentest Upcoming? Bring a Badgy. While badge reproduction may not be the intended use of this product, if you are a physical tester and you don’t own […]

The post Performing a Physical Pentest? Bring This! appeared first on Black Hills Information Security, Inc..

A Morning with Cobalt Strike & Symantec

Joff Thyer // If you have been penetration testing a while, you likely have ended up in a Red Team situation or will be engaged in it soon enough. From […]

The post A Morning with Cobalt Strike & Symantec appeared first on Black Hills Information Security, Inc..

Hide Payload in MS Office Document Properties

Carrie Roberts* // Can you think of a reason why you might want to put a lengthy comment into the properties of an MS Office document? If you can, then […]

The post Hide Payload in MS Office Document Properties appeared first on Black Hills Information Security, Inc..

WEBCAST: Preparing Yourself & Your Company for a First Pen-test

CJ Cox// Are you about to have your first pen test? It can be a little overwhelming as a lot of people are sure they’re going to be destroyed in […]

The post WEBCAST: Preparing Yourself & Your Company for a First Pen-test appeared first on Black Hills Information Security, Inc..

How to Build a C2 Infrastructure with Digital Ocean – Part 1

Lee Kagan* // Deploying an offensive infrastructure for red teams and penetration tests can be repetitive and complicated. One of my roles on our team is to build-out and maintain […]

The post How to Build a C2 Infrastructure with Digital Ocean – Part 1 appeared first on Black Hills Information Security, Inc..

Abusing Exchange Mailbox Permissions with MailSniper

Beau Bullock // Overview Microsoft Exchange users have the power to grant other users various levels of access to their mailbox folders. For example, a user can grant other users […]

The post Abusing Exchange Mailbox Permissions with MailSniper appeared first on Black Hills Information Security, Inc..

WEBCAST: Two Covert C2 Channels

John Strand // In this webcast, we walk through different tools to establish and test your Command and Control (C2) detection capabilities. Why does this matter? Almost all organizations we […]

The post WEBCAST: Two Covert C2 Channels appeared first on Black Hills Information Security, Inc..

OS Command Injection; The Pain, The Gain

Carrie Roberts // OS Command Injection is fun. I recently found this vulnerability on a web application I was testing (thanks to Burp Suite scanner). I was excited because I […]

The post OS Command Injection; The Pain, The Gain appeared first on Black Hills Information Security, Inc..

The Wi-Fi Travel Kits

Jordan Drysdale // Sally and I recently ventured to an on-site wireless engagement with a veryΒ security-matureΒ customer. Long story short, the level of protection that WPA2 Enterprise with certificate validation provides […]

The post The Wi-Fi Travel Kits appeared first on Black Hills Information Security, Inc..

A Marketer’s Lessons in Con Artistry for Good & Learning

Sierra Ward*Β // Normally I am hidden in the back rooms at BHIS, chipping away at 10 million marketing tasks. Β I show up occasionally in webcasts, lurking again in the shadows, […]

The post A Marketer’s Lessons in Con Artistry for Good & Learning appeared first on Black Hills Information Security, Inc..

How to Take Advantage of Weak NTFS Permissions

David Fletcher // Weak NTFS permissions can allow a number of different attacks within a target environment. This can include: Access to sensitive information Modification of system binaries and configuration […]

The post How to Take Advantage of Weak NTFS Permissions appeared first on Black Hills Information Security, Inc..

Downloading an Address Book from an Outlook Web App (OWA) Portal

Carrie Roberts //Β  Update 10/03/16:Β Want to download the address book automatically with PowerShell? Check out Beau Bullocks latest additions to MailSniper As part of a penetration test, you’ve gained access […]

The post Downloading an Address Book from an Outlook Web App (OWA) Portal appeared first on Black Hills Information Security, Inc..

How to Build Your Own Penetration Testing Drop Box

Beau Bullock // TL;DR I compared three single-board computers (SBC) against each other with a specific goal of finding which one would serve best as a β€œpenetration testing dropbox”, and […]

The post How to Build Your Own Penetration Testing Drop Box appeared first on Black Hills Information Security, Inc..

❌