❌

Reading view

There are new articles available, click to refresh the page.

Getting Started with NetExec: Streamlining Network Discovery and Access

One tool that I can't live without when performing a penetration test in an Active Directory environment is called NetExec. Being able to efficiently authenticate against multiple systems in the network is crucial, and NetExec is an incredibly powerful tool that helps automate a lot of this activity.

The post Getting Started with NetExec: Streamlining Network Discovery and Access appeared first on Black Hills Information Security, Inc..

PNPT: Certification Review

Daniel Pizarro // What is the PNPT?Β  The Practical Network Penetration Tester (PNPT), created by TCM Security (TCMS), is a 5-day ethical hacking certification exam that assesses a pentester’s ability […]

The post PNPT: Certification Review appeared first on Black Hills Information Security, Inc..

Podcast: Passwords: You Are the Weakest Link

Why are companies still recommending an 8-character password minimum?Β  Passwords are some of the easiest targets for attackers, yet companies still allow weak passwords in their environment.Β Multiple service providers recommend […]

The post Podcast: Passwords: You Are the Weakest Link appeared first on Black Hills Information Security, Inc..

πŸ’Ύ

Webcast: Passwords: You Are the Weakest Link

Why are companies still recommending an 8-character password minimum?Β  Passwords are some of the easiest targets for attackers, yet companies still allow weak passwords in their environment.Β Multiple service providers recommend […]

The post Webcast: Passwords: You Are the Weakest Link appeared first on Black Hills Information Security, Inc..

πŸ’Ύ

Passwords: Our First Line of Defense

Darin Roberts // β€œWhy do you recommend a 15-character password policy when (name your favorite policy here) recommends only 8-character minimum passwords?” I have had this question posed to me […]

The post Passwords: Our First Line of Defense appeared first on Black Hills Information Security, Inc..

Podcast: Weaponizing Corporate Intel. This Time, It’s Personal!

Beau Bullock & Mike Felch// Strategically targeting a corporation requires deep knowledge of their technologies and employees. Successfully compromising an organization can depend on the quality of reconnaissance a tester […]

The post Podcast: Weaponizing Corporate Intel. This Time, It’s Personal! appeared first on Black Hills Information Security, Inc..

πŸ’Ύ

Webcast: Attack Tactics 5 – Zero to Hero Attack

Timecode links take you to YouTube: 4:11 – Infrastructure & Background8:28 – Overview & Breakdown of Attack Methodology and Plans11:35 – Start of Attack (Gaining Access), Password Spraying Toolkit15:24 – […]

The post Webcast: Attack Tactics 5 – Zero to Hero Attack appeared first on Black Hills Information Security, Inc..

How To Rotate Your Source IP Address

Darin Roberts// IP-Go-Round – Source IP Rotation I was on an engagement recently that was blocking my password sprays based on my IP address.Β  If I made 3 incorrect requests […]

The post How To Rotate Your Source IP Address appeared first on Black Hills Information Security, Inc..

Wide-Spread Local Admin Testing

Brian Fehrman // In our experience, we see many Windows environments in which the local Administrator password is the same for many machines. We refer to this as Wide-Spread Local […]

The post Wide-Spread Local Admin Testing appeared first on Black Hills Information Security, Inc..

Asterisk SIP Server, From β€œInfo” to β€œOuch”

Carrie Roberts // I learned some new stuff that will make me pay attention to β€œAsterisk Detection” Nessus informational findings in the future . . . On an external network […]

The post Asterisk SIP Server, From β€œInfo” to β€œOuch” appeared first on Black Hills Information Security, Inc..

❌