❌

Reading view

There are new articles available, click to refresh the page.

Hunt for Weak Spots in Your Wireless Network with Airodump-ng from the Aircrack-ng Suite

In this blog, I’m going to walk you through how to get started with airodump-ng and some of the techniques that you can use to home in on access points of interest.

The post Hunt for Weak Spots in Your Wireless Network with Airodump-ng from the Aircrack-ng Suite appeared first on Black Hills Information Security, Inc..

Red Teaming: A Story From the Trenches

This article originally featured in the very first issue of our PROMPT# zine β€” Choose Wisely. You can find that issue (and all the others) here: https://www.blackhillsinfosec.com/prompt-zine/ I remember a […]

The post Red Teaming: A Story From the Trenches appeared first on Black Hills Information Security, Inc..

The Human Element in Cybersecurity: Understanding Trust and Social EngineeringΒ 

Human TrustΒ  Most people associated with information technology roles understand the application of technical controls like the use of firewalls, encryption, and security products for defenses against digital threats. Proper […]

The post The Human Element in Cybersecurity: Understanding Trust and Social EngineeringΒ  appeared first on Black Hills Information Security, Inc..

If You Don’t Ruse, You Lose: A Simple Guide to Blending in While Breaking InΒ 

Joseph Kingstone // Are you assigned a physical penetration test andΒ want to fly under the radar and meet all of your objectives like the elite hacker you are? Stick around […]

The post If You Don’t Ruse, You Lose: A Simple Guide to Blending in While Breaking InΒ  appeared first on Black Hills Information Security, Inc..

Tales From the Pick: Intro to Physical Security Tools

Joseph Kingstone // Looking to get into physical security? Not sure what you need to get started? Look no further.Β  What are Physical Security Assessments?Β Β  Physical security assessments evaluate an […]

The post Tales From the Pick: Intro to Physical Security Tools appeared first on Black Hills Information Security, Inc..

How to Hack Hardware using UART

Raymond Felch // Preface: I began my exploration of reverse-engineering firmware a few weeks back (see β€œJTAG – Micro-Controller Debuggingβ€œ), and although I made considerable progress finding and identifying the […]

The post How to Hack Hardware using UART appeared first on Black Hills Information Security, Inc..

Gathering Proximity Card Credentials: The Wiegotcha

David Fletcher// There are a number of items that I watch on eBay. Included in that group are long-range proximity card readers. As it turns out, I was recently able […]

The post Gathering Proximity Card Credentials: The Wiegotcha appeared first on Black Hills Information Security, Inc..

Performing a Physical Pentest? Bring This!

Jordan Drysdale// Physical Pentest Upcoming? Bring a Badgy. While badge reproduction may not be the intended use of this product, if you are a physical tester and you don’t own […]

The post Performing a Physical Pentest? Bring This! appeared first on Black Hills Information Security, Inc..

Let’s Get Physical* Part 1; Defeating Wetware Access Controls

Sally Vandeven // I found myself with a little extra time one day (and I didn’t tell my project manager) so I thought it would be a great time to […]

The post Let’s Get Physical* Part 1; Defeating Wetware Access Controls appeared first on Black Hills Information Security, Inc..

❌