Reading view
Ensuring Secure Container Deployments with Image Signature Verification
How to Build an Effective Security Awareness Program
Threat Intelligence Sweeping now supports container security telemetry data
AI Configuration Best Practices to address AI Security Risks
How to Install and Perform Wi-Fi Attacks with WifiphisherΒ
tl;dr: Install Wifiphisher on Kali and run a basic attack.Β This crappy little copy/paste-able operation resulted in a functional Wifiphisher virtual environment on Kali (as of January 22, 2024).Β Β Two [β¦]
The post How to Install and Perform Wi-Fi Attacks with WifiphisherΒ appeared first on Black Hills Information Security, Inc..
How to Weaponize the Yubikey
Michael Allen // A couple of years ago, I had a YubiKey that was affected by a security vulnerability, and to fix the issue, Yubico sent me a brand new [β¦]
The post How to Weaponize the Yubikey appeared first on Black Hills Information Security, Inc..
An SMB Relay Race β How To Exploit LLMNR and SMB Message Signing for Fun and Profit
Jordan Drysdale// This is basically a slight update and rip off of Marcelloβs work out here: https://byt3bl33d3r.github.io/practical-guide-to-ntlm-relaying-in-2017-aka-getting-a-foothold-in-under-5-minutes.html /tl;dr β Zero to DA on an environment through an exposed Outlook Web [β¦]
The post An SMB Relay Race β How To Exploit LLMNR and SMB Message Signing for Fun and Profit appeared first on Black Hills Information Security, Inc..
Letβs Go Hunting! How to Hunt Command & Control Channels Using Bro IDS and RITA
Logan Lembke// Here at BHIS, we β₯ Bro IDS. Imagineβ¦ Bro IDS Everywhere! If you havenβt encountered Bro IDS before, checkout thisΒ webcastΒ on Johnβs Youtube channel discussing the need for Bro [β¦]
The post Letβs Go Hunting! How to Hunt Command & Control Channels Using Bro IDS and RITA appeared first on Black Hills Information Security, Inc..