❌

Reading view

There are new articles available, click to refresh the page.

Windows Event Logs for Red Teams

Tim Fowler // Do you know what could be lurking in your Windows event logs? In May of 2022, I was sent a Threat Post article about a new technique […]

The post Windows Event Logs for Red Teams appeared first on Black Hills Information Security, Inc..

How to Pull Wireless Credentials with the Bash Bunny

Sally Vandeven // All of the BHIS testers are pretty geeked about Hak5’s newest toy β€” the Bash Bunny. Last week, Jordan blogged about the USB Exfiltration payload. Today I […]

The post How to Pull Wireless Credentials with the Bash Bunny appeared first on Black Hills Information Security, Inc..

How to Get USB_Exfiltration Payload Using the Bash Bunny

Jordan Drysdale // This is a super quick write-up on the first very useful payload we tested and confirmed as 100% reliable on all Windows systems (XP-SP3+) with PowerShell enabled. […]

The post How to Get USB_Exfiltration Payload Using the Bash Bunny appeared first on Black Hills Information Security, Inc..

❌